[go: up one dir, main page]

CN107566401A - The means of defence and device of virtualized environment - Google Patents

The means of defence and device of virtualized environment Download PDF

Info

Publication number
CN107566401A
CN107566401A CN201710940390.4A CN201710940390A CN107566401A CN 107566401 A CN107566401 A CN 107566401A CN 201710940390 A CN201710940390 A CN 201710940390A CN 107566401 A CN107566401 A CN 107566401A
Authority
CN
China
Prior art keywords
type
data
access
request message
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710940390.4A
Other languages
Chinese (zh)
Other versions
CN107566401B (en
Inventor
柴坤哲
曹鸿健
王永涛
杨卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710940390.4A priority Critical patent/CN107566401B/en
Publication of CN107566401A publication Critical patent/CN107566401A/en
Application granted granted Critical
Publication of CN107566401B publication Critical patent/CN107566401B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种虚拟化环境的防护方法及装置,该方法包括:当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。由此可见,本发明能够监测用于访问虚拟化环境的环境特征信息的访问请求消息,并针对该访问请求消息执行对应的防护处理,以防止被人识别出虚拟化环境,提升了虚拟化环境的防护效果。

The invention discloses a method and device for protecting a virtualized environment. The method includes: when monitoring an access request message for accessing environmental feature information of the virtualized environment, intercepting the access request message; The access result data corresponding to the access request message, and determine the data type of the access result data; query the protection policy that matches the data type of the access result data, and process the access request message according to the query protection policy Carry out protective treatment. It can be seen that the present invention can monitor the access request message used to access the environment feature information of the virtualized environment, and perform corresponding protection processing for the access request message, so as to prevent the virtualized environment from being recognized by people, and improve the virtualized environment. protective effect.

Description

虚拟化环境的防护方法及装置Protection method and device for virtualized environment

技术领域technical field

本发明涉及网络通信技术领域,具体涉及一种虚拟化环境的防护方法及装置。The invention relates to the technical field of network communication, in particular to a protection method and device for a virtualized environment.

背景技术Background technique

随着通信技术的不断发展,互联网已经融入了生活的方方面面。然而,黑客技术作为互联网发展的衍生物,也变得无孔不入,日益严峻地威胁着网络安全。以无线网络为例而言,虽然无线网络以其便于接入的优势赢得了越来越多的用户。但是,通过入侵无线网络而实现黑客攻击的事件也日益高发。为此,出现了各种各样的防御手段来应对黑客的入侵。例如,通过虚拟化环境能够检测并分析黑客的行为,以便于做出有针对性地防御措施。With the continuous development of communication technology, the Internet has been integrated into every aspect of life. However, as a derivative of the development of the Internet, hacking technology has also become pervasive, threatening network security increasingly seriously. Take the wireless network as an example, although the wireless network has won more and more users because of its advantages of easy access. However, incidents of hacking attacks by invading wireless networks are also increasing. For this reason, various defensive means have emerged to deal with hacker intrusions. For example, the behavior of hackers can be detected and analyzed through a virtualized environment, so that targeted defense measures can be taken.

但是,发明人在实现本发明的过程中,发现现有的虚拟化环境至少存在如下问题:有经验的黑客通常会编写代码访问虚拟化环境的相关特征信息,以便根据访问结果检测当前所处的环境是否为虚拟化环境,一旦检测出虚拟化环境则会立刻逃离,从而规避系统的检测分析。但是,现有的虚拟化环境无法防止黑客的检测,防护功能较差。However, in the process of implementing the present invention, the inventor found that the existing virtualization environment has at least the following problems: experienced hackers usually write codes to access the relevant feature information of the virtualization environment, so as to detect the current location according to the access results. Whether the environment is a virtualized environment, once a virtualized environment is detected, it will escape immediately, thereby avoiding the detection and analysis of the system. However, the existing virtualization environment cannot prevent the detection of hackers, and the protection function is poor.

发明内容Contents of the invention

鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的虚拟化环境的防护方法及装置。In view of the above problems, the present invention is proposed to provide a protection method and device for a virtualized environment that overcomes the above problems or at least partially solves the above problems.

依据本发明的一个方面,提供了一种虚拟化环境的防护方法,包括:According to one aspect of the present invention, a protection method for a virtualized environment is provided, including:

当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;intercepting the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualization environment;

确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;determining the access result data corresponding to the access request message, and determining the data type of the access result data;

查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。Query the protection policy that matches the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

根据本发明的另一方面,提供了一种虚拟化环境的防护装置,包括:According to another aspect of the present invention, a protection device for a virtualized environment is provided, including:

拦截模块,适于当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;An intercepting module, adapted to intercept the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualized environment;

确定模块,适于确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;A determining module, adapted to determine access result data corresponding to the access request message, and determine a data type of the access result data;

防护模块,适于查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。The protection module is adapted to query a protection policy matching the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

根据本发明的再一个方面,提供了一种电子设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;According to another aspect of the present invention, an electronic device is provided, including: a processor, a memory, a communication interface, and a communication bus, and the processor, the memory, and the communication interface complete mutual communication through the communication bus communication;

所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行上述虚拟化环境的防护方法对应的操作。The memory is used to store at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the above-mentioned protection method for the virtualized environment.

根据本发明的再一个方面,提供了一种计算机存储介质,所述存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行上述虚拟化环境的防护方法对应的操作。According to still another aspect of the present invention, a computer storage medium is provided, wherein at least one executable instruction is stored in the storage medium, and the executable instruction causes a processor to perform operations corresponding to the above-mentioned virtualization environment protection method.

在本发明提供的虚拟化环境的防护方法及装置中,当监测到用于访问虚拟化环境的环境特征信息的访问请求消息时,拦截该访问请求消息;确定与该访问请求消息相对应的访问结果数据,并确定该访问结果数据的数据类型;然后,查询与该访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对该访问请求消息进行防护处理。由此可见,本发明能够监测用于访问虚拟化环境的环境特征信息的访问请求消息,并针对该访问请求消息执行对应的防护处理,以防止被人识别出虚拟化环境,提升了虚拟化环境的防护效果。In the protection method and device of the virtualized environment provided by the present invention, when an access request message for accessing the environment feature information of the virtualized environment is monitored, the access request message is intercepted; the access request message corresponding to the access request message is determined; result data, and determine the data type of the access result data; then, query the protection strategy matching the data type of the access result data, and perform protection processing on the access request message according to the queried protection strategy. It can be seen that the present invention can monitor the access request message used to access the environment feature information of the virtualized environment, and perform corresponding protection processing for the access request message, so as to prevent the virtualized environment from being recognized by people, and improve the virtualized environment. protective effect.

上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.

附图说明Description of drawings

通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:

图1示出了本发明一个实施例提供的虚拟化环境的防护方法的流程图;FIG. 1 shows a flowchart of a method for protecting a virtualized environment provided by an embodiment of the present invention;

图2示出了一种无线网络入侵检测系统的结构图;Fig. 2 shows a structural diagram of a wireless network intrusion detection system;

图3示出了无线网络入侵检测系统中的多层环的结构示意图;FIG. 3 shows a schematic structural diagram of a multi-layer ring in a wireless network intrusion detection system;

图4示出了本发明一个实施例提供的虚拟化环境的防护装置的结构图;FIG. 4 shows a structural diagram of a protection device for a virtualized environment provided by an embodiment of the present invention;

图5示出了根据本发明一个实施例提供的电子设备的结构示意图。Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the present invention.

具体实施方式detailed description

下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

图1示出了本发明一个实施例提供的一种虚拟化环境的防护方法的流程图。其中,本实施例中的虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。如图1所示,该方法包括以下步骤:Fig. 1 shows a flow chart of a protection method for a virtualized environment provided by an embodiment of the present invention. Wherein, the virtualization environment in this embodiment includes: a virtualization environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox. As shown in Figure 1, the method includes the following steps:

步骤S100:预先确定用于访问虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口,针对该应用程序接口设置挂钩函数。Step S100: Predetermine the application program interface corresponding to the access request message for accessing the environment feature information of the virtualized environment, and set a hook function for the application program interface.

其中,环境特征信息是指:与运行环境相关的网络信息、和/或软硬件信息。相应地,通过环境特征信息能够判断当前运行环境为真实环境或虚拟化环境。例如,环境特征信息包括以下中的至少一个:物理网卡信息、注册表信息、以及驱动信息。黑客等攻击者通过用于访问虚拟化环境的环境特征信息的访问请求消息能够实现检测虚拟化环境的目的。为此,本发明实施例的目的在于:预先确定被攻击者用来访问虚拟化环境的环境特征信息的访问请求消息及其对应的应用程序接口,并在相应的应用程序接口处设置挂钩函数,以实现对该类访问请求消息的监控。其中,挂钩函数用于监测通过应用程序接口触发的访问请求消息。Wherein, the environment characteristic information refers to: network information and/or software and hardware information related to the operating environment. Correspondingly, it can be determined whether the current operating environment is a real environment or a virtualized environment based on the environment feature information. For example, the environment feature information includes at least one of the following: physical network card information, registry information, and driver information. An attacker such as a hacker can realize the purpose of detecting the virtualized environment through an access request message for accessing the environment feature information of the virtualized environment. For this reason, the purpose of the embodiments of the present invention is to: predetermine the access request message and the corresponding application program interface used by the attacker to access the environment feature information of the virtualized environment, and set the hook function at the corresponding application program interface, In order to realize the monitoring of this kind of access request message. Wherein, the hook function is used to monitor the access request message triggered through the application program interface.

具体地,由于访问请求消息包括多种类型,因此,如何判断一个访问请求消息是否属于用于访问虚拟化环境的环境特征信息的访问请求消息是本发明需要解决的技术问题之一。为了解决这一问题,在本实施例中,预先监测入侵虚拟化环境的电子设备针对该虚拟化环境发出的访问行为,根据该访问行为所对应的访问结果确定用于访问虚拟化环境的环境特征信息的访问请求消息。Specifically, since the access request message includes multiple types, how to judge whether an access request message belongs to the access request message for accessing the environment feature information of the virtualized environment is one of the technical problems to be solved in the present invention. In order to solve this problem, in this embodiment, the access behavior issued by the electronic device intruding into the virtualization environment for the virtualization environment is monitored in advance, and the environmental characteristics for accessing the virtualization environment are determined according to the access result corresponding to the access behavior Access request message for information.

例如,若通过监测发现,攻击者通常会利用访问请求消息1以及访问请求消息1’来获取物理网卡信息,利用访问请求消息2来获取注册表信息,利用访问请求消息3以及访问请求消息3’来获取驱动信息,相应地,将访问请求消息1、访问请求消息1’、访问请求消息2、访问请求消息3以及访问请求消息3’均确定为用于访问虚拟化环境的环境特征信息的访问请求消息。然后,进一步确定上述的每个访问请求消息所对应的应用程序接口(API),这些应用程序接口可能是系统中自带的接口,也可能是攻击者自行编写的接口,通过在这些应用程序接口处设置挂钩函数即可实现监测目的。For example, if it is found through monitoring, the attacker usually uses access request message 1 and access request message 1' to obtain physical network card information, uses access request message 2 to obtain registry information, and uses access request message 3 and access request message 3' To obtain the driver information, correspondingly, the access request message 1, the access request message 1', the access request message 2, the access request message 3 and the access request message 3' are all determined as the access for accessing the environment characteristic information of the virtualization environment request message. Then, further determine the application program interface (API) corresponding to each of the above-mentioned access request messages. The monitoring purpose can be achieved by setting the hook function here.

其中,步骤S100为一个可选的步骤,在本发明其他的实施例中,也可以省略步骤S100,或者,通过其他替代方式实现步骤S100的目的。Wherein, step S100 is an optional step, and in other embodiments of the present invention, step S100 may also be omitted, or the purpose of step S100 may be achieved in other alternative ways.

步骤S110:当监测到用于访问虚拟化环境的环境特征信息的访问请求消息时,拦截该访问请求消息。Step S110: When an access request message for accessing the environment feature information of the virtualized environment is detected, intercept the access request message.

其中,通过挂钩函数(即HOOK机制)拦截该访问请求消息,以便根据挂钩函数中预设的处理逻辑来处理该访问请求消息。Wherein, the access request message is intercepted by a hook function (that is, the HOOK mechanism), so as to process the access request message according to the preset processing logic in the hook function.

步骤S120:确定与该访问请求消息相对应的访问结果数据,并确定访问结果数据的数据类型。Step S120: Determine the access result data corresponding to the access request message, and determine the data type of the access result data.

其中,访问结果数据的数据类型可以根据多种因素确定。在本实施例中,主要是根据防护策略确定的。具体地,需要预先获取访问结果数据的全部数据内容,然后,分别针对其中的每一项数据内容设置对应的防护策略,将防护策略相同的数据内容划分为同一种数据类型。Wherein, the data type of the access result data may be determined according to various factors. In this embodiment, it is mainly determined according to the protection policy. Specifically, it is necessary to obtain all data contents of the access result data in advance, and then set a corresponding protection policy for each item of data content, and classify data contents with the same protection strategy into the same data type.

例如,访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型。其中,第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型。例如,无论是虚拟化环境还是非虚拟化环境,都需要具备网卡信息和注册表信息,因此,将该类信息所对应的访问结果数据作为第一类数据类型。第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型。例如,将虚拟化环境中独有的数据所对应的类型作为第二类数据类型。For example, the data types of the access result data include: the first type of data and/or the second type of data. Wherein, the first type of data type includes: a type corresponding to data existing in both the virtualized environment and the non-virtualized environment. For example, whether it is a virtualized environment or a non-virtualized environment, network card information and registry information are required. Therefore, the access result data corresponding to this type of information is used as the first type of data type. The second type of data type includes: types corresponding to data available in the virtualized environment and not available in the non-virtualized environment. For example, the type corresponding to the unique data in the virtualization environment is used as the second type of data type.

步骤S130:查询与访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对访问请求消息进行防护处理。Step S130: Query the protection policy that matches the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

其中,在本实施例中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与第一类数据类型的访问结果数据相对应的伪结果数据。由于该类型的数据是所有环境中都存在的,因此,必须向电子设备返回访问结果,否则会引起电子设备使用者的怀疑,为此,本实施例采用返回伪结果数据的方式实现。实际上,也可以预先判断访问结果数据的真实内容是否会泄露虚拟化环境的特征,若是,则返回伪结果数据;若否,也可以直接返回真实的访问结果数据。Among them, in this embodiment, the protection strategy matching the first type of data includes: setting corresponding fake result data for the access result data of the first type of data in advance, when the access to the first type of data is intercepted When an access request message is sent by the result data, dummy result data corresponding to the access result data of the first data type is returned for the access request message. Since this type of data exists in all environments, the access result must be returned to the electronic device, otherwise the user of the electronic device will be suspicious. Therefore, this embodiment adopts the method of returning false result data. In fact, it is also possible to pre-judge whether the real content of the access result data will reveal the characteristics of the virtualized environment, and if so, return the fake result data; if not, directly return the real access result data.

与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。由于该类型的数据是仅存在于虚拟化环境中的,因此,一旦向电子设备返回对应的数据则会使电子设备识破虚拟化环境。所以,对于第二类数据类型所对应的访问请求消息不予返回响应结果,以使电子设备无法获取到用于识别虚拟化环境特征的数据。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message. Since this type of data exists only in the virtualization environment, once the corresponding data is returned to the electronic device, the electronic device will be able to see through the virtualization environment. Therefore, no response result is returned to the access request message corresponding to the second type of data, so that the electronic device cannot obtain the data used to identify the characteristics of the virtualized environment.

由此可见,本发明能够监测用于访问虚拟化环境的环境特征信息的访问请求消息,并针对该访问请求消息执行对应的防护处理,以防止被人识别出虚拟化环境,提升了虚拟化环境的防护效果。It can be seen that the present invention can monitor the access request message used to access the environment feature information of the virtualized environment, and perform corresponding protection processing for the access request message, so as to prevent the virtualized environment from being recognized by people, and improve the virtualized environment. protective effect.

为了便于理解本发明,图2示出了本发明提供的一种具体的无线网络入侵检测系统的结构示意图,相应地,本发明中的虚拟化环境的防护方法可基于该系统实现。如图2所示,该系统包括:无线接入模块21、网络传输模块22、第一入侵检测模块23、以及第二入侵检测模块24。其中,图2所示的第二入侵检测模块24的数量为多个,实际情况中,第二入侵检测模块24的数量也可以仅为一个。并且,在本发明其他的实施例中,第一入侵检测模块23的数量也可以为多个。In order to facilitate the understanding of the present invention, FIG. 2 shows a schematic structural diagram of a specific wireless network intrusion detection system provided by the present invention. Correspondingly, the method for protecting a virtualized environment in the present invention can be implemented based on the system. As shown in FIG. 2 , the system includes: a wireless access module 21 , a network transmission module 22 , a first intrusion detection module 23 , and a second intrusion detection module 24 . Wherein, the number of the second intrusion detection module 24 shown in FIG. 2 is multiple, and in actual situations, the number of the second intrusion detection module 24 may be only one. Moreover, in other embodiments of the present invention, the number of first intrusion detection modules 23 may also be multiple.

在本实施例中,无线网络入侵检测系统主要用于诱使攻击者接入,监视并记录攻击者的设备信息及攻击行为,相应地,可以实现有针对性地防御措施,也可以在必要时实施报警,还可以针对攻击者进行溯源追踪等。因此,本实施例中的无线网络入侵检测系统也可以理解为通过蜜罐技术实现的蜜罐系统,该蜜罐系统能够实现多种功能。下面分别介绍该系统中的各个模块的具体结构和工作原理:In this embodiment, the wireless network intrusion detection system is mainly used to lure the attacker to access, monitor and record the attacker's device information and attack behavior, correspondingly, it can implement targeted defense measures, and can also be used when necessary Implement alarms, and trace the source of attackers, etc. Therefore, the wireless network intrusion detection system in this embodiment can also be understood as a honeypot system implemented by honeypot technology, and the honeypot system can realize various functions. The specific structure and working principle of each module in the system are introduced respectively as follows:

一、无线接入模块1. Wireless access module

系统的最外层为无线接入模块21。无线接入模块21适于监测是否存在通过预设的网络漏洞入侵无线网络的电子设备;当监测结果为是时,获取该电子设备的设备标识以及与该设备标识相对应的设备接入信息;可选的,还可以针对该设备接入信息进行分析,根据分析结果对该电子设备进行定位。由此可见,无线接入模块21主要具备两方面的功能:一方面,主动设置网络漏洞,以便诱使攻击者接入;另一方面,一旦发现接入无线网络的电子设备则记录该电子设备的设备标识以及设备接入信息。The outermost layer of the system is the wireless access module 21 . The wireless access module 21 is adapted to monitor whether there is an electronic device that invades the wireless network through a preset network vulnerability; when the monitoring result is yes, obtain the device identification of the electronic device and the device access information corresponding to the device identification; Optionally, the access information of the device may also be analyzed, and the electronic device may be located according to the analysis result. It can be seen that the wireless access module 21 mainly has two functions: on the one hand, it actively sets up network vulnerabilities to lure attackers to access; on the other hand, once an electronic device connected to the wireless network is found, it records the electronic device device identification and device access information.

首先,介绍设置网络漏洞的具体实现方式:具体地,无线接入模块21在预设的无线接入设备中设置网络漏洞,以供外部的电子设备接入无线网络。其中,无线接入设备可以为路由器等各类能够用于接入无线网络的接入点。具体地,设置网络漏洞时,可以通过开启无线网络端口、和/或弱化无线网络密码等多种方式实现。其中,网络漏洞也可以理解为陷阱,主要用于诱骗攻击者接入。本发明对设置网络漏洞的具体实现方式不做限定。Firstly, a specific implementation method of setting a network loophole is introduced: specifically, the wireless access module 21 sets a network loophole in a preset wireless access device for external electronic devices to access the wireless network. Wherein, the wireless access device may be various types of access points capable of accessing a wireless network, such as a router. Specifically, when setting a network vulnerability, it can be realized in various ways such as opening a wireless network port, and/or weakening a wireless network password. Among them, network vulnerabilities can also be understood as traps, which are mainly used to trick attackers into accessing. The present invention does not limit the specific implementation manner of setting network loopholes.

然后,介绍记录电子设备的设备标识以及设备接入信息的具体实现方式。其中,设备标识可以是各种能够唯一标识一台电子设备的信息,以便于在后续过程中根据设备标识对该电子设备的相关信息进行追踪。设备接入信息是指:能够在设备接入无线网络的过程中获取到的与该设备相关的信息。相应地,无线接入模块21记录连接该无线网络的设备名称、IP地址、MAC地址等设备接入信息,以便定位攻击者的物理位置,使攻击者一接入无线网络就处于被监视状态。可选的,为了迫使攻击者泄露更多的信息,在本实施例中,无线接入模块21在获取该电子设备的设备标识以及与该设备标识相对应的设备接入信息时,还可以进一步向电子设备推送预设网页,获取该电子设备针对预设网页产生的访问结果,根据访问结果确定该电子设备的设备接入信息。其中,预设网页包括:通过社交账号登录的社交网页或其他需要通过个人信息而登录的页面,相应地,电子设备的设备接入信息进一步包括:根据针对社交网页产生的访问结果确定的社交账号信息,例如,微博账号及密码信息、QQ账号及密码信息等。除此之外,在电子设备访问网页的过程中,还可以进一步获取到其他的设备接入信息,例如,浏览器版本、操作系统版本、设备屏幕分辨率、以及浏览器插件信息等设备接入信息。无线接入模块21将该电子设备的设备接入信息与该电子设备的设备标识关联存储到预设的设备接入表中,以备后续查询。Then, a specific implementation manner of recording the device identification and device access information of the electronic device is introduced. Wherein, the device identifier can be various information that can uniquely identify an electronic device, so that the related information of the electronic device can be tracked according to the device identifier in the subsequent process. The device access information refers to information related to the device that can be obtained during the process of the device accessing the wireless network. Correspondingly, the wireless access module 21 records device access information such as the device name, IP address, and MAC address connected to the wireless network, so as to locate the physical location of the attacker, so that the attacker is under surveillance as soon as he accesses the wireless network. Optionally, in order to force the attacker to disclose more information, in this embodiment, when the wireless access module 21 obtains the device ID of the electronic device and the device access information corresponding to the device ID, it may further Pushing the preset webpage to the electronic device, obtaining the access result generated by the electronic device for the preset webpage, and determining the device access information of the electronic device according to the access result. Wherein, the preset web page includes: a social web page logged in through a social account or other pages that need to be logged in through personal information. Information, such as Weibo account and password information, QQ account and password information, etc. In addition, in the process of electronic devices accessing webpages, other device access information can be further obtained, such as browser version, operating system version, device screen resolution, and browser plug-in information. information. The wireless access module 21 associates and stores the device access information of the electronic device with the device identifier of the electronic device in a preset device access table for subsequent query.

由此可见,无线接入模块主要用于诱使攻击者接入并获取相应的设备接入信息,以便实现定位或预警等功能。It can be seen that the wireless access module is mainly used to lure attackers to access and obtain corresponding device access information, so as to realize functions such as positioning or early warning.

二、网络传输模块2. Network transmission module

系统的次外层为网络传输模块22。网络传输模块22适于获取电子设备接入无线网络后产生的网络流量信息,并将获取到的网络流量信息提供给第一入侵检测模块23进行后续分析。另外,网络传输模块22还适于确定电子设备接入无线网络后产生的网络流量信息中是否包含由符合预设预警规则的访问行为触发的网络流量,若是,则生成入侵预警信号。具体实施时,网络传输模块22获取入侵无线网络的电子设备产生的网络流量信息;针对该网络流量信息进行分析,根据分析结果确定电子设备的网络访问行为;判断该电子设备的网络访问行为是否符合预设的预警规则,若是,则生成用于预警的入侵预警信号。The second outer layer of the system is the network transmission module 22 . The network transmission module 22 is adapted to acquire network traffic information generated after the electronic device accesses the wireless network, and provide the acquired network traffic information to the first intrusion detection module 23 for subsequent analysis. In addition, the network transmission module 22 is also adapted to determine whether the network traffic information generated after the electronic device accesses the wireless network includes network traffic triggered by access behaviors that meet preset warning rules, and if so, generate an intrusion warning signal. During specific implementation, the network transmission module 22 obtains the network traffic information generated by the electronic device invading the wireless network; analyzes the network traffic information, and determines the network access behavior of the electronic device according to the analysis result; judges whether the network access behavior of the electronic device complies with A preset early warning rule, if yes, generates an intrusion early warning signal for early warning.

其中,网络传输模块主要通过网络抓包等方式获取电子设备接入无线网络后的网络流量信息。另外,发明人在实现本发明的过程中发现:传统的网络抓包方式只能获取到电子设备通过无线网络访问外部网站的流量,而无法获取到电子设备与无线网络内部的各个设备之间的流量。例如,在本实施例中,由于无线网络中包含第一入侵检测模块以及多个第二入侵检测模块等多个预设设备,因此,为了更加准确地获取电子设备针对每个入侵检测模块产生的网络流量信息,在本实施例中,将各个第一入侵检测模块以及第二入侵检测模块以桥接方式接入无线网络,相应地,网络传输模块分别获取电子设备入侵无线网络后针对无线网络中的各个预设设备(即:第一入侵检测模块以及第二入侵检测模块)产生的点对点网络流量信息,并将该点对点网络流量信息提供给对应的预设设备。例如,针对获取到的电子设备访问第一入侵检测模块的网络流量信息,将该部分网络流量信息提供给第一入侵检测模块进行后续分析处理。由此可见,本发明通过桥接方式能够准确获取到电子设备与各个入侵检测模块之间的点对点流量信息,从而便于确定电子设备分别针对每个入侵检测模块实施的网络行为。Among them, the network transmission module mainly obtains network traffic information after the electronic device is connected to the wireless network through network capture and other methods. In addition, the inventor found in the process of implementing the present invention that: the traditional network packet capture method can only obtain the traffic of electronic devices accessing external websites through wireless networks, but cannot obtain the traffic between electronic devices and various devices inside the wireless network. flow. For example, in this embodiment, since the wireless network includes multiple preset devices such as the first intrusion detection module and multiple second intrusion detection modules, in order to more accurately obtain the information generated by the electronic device for each intrusion detection module Network traffic information. In this embodiment, each first intrusion detection module and second intrusion detection module are connected to the wireless network in a bridging manner. Correspondingly, the network transmission module respectively acquires Each preset device (namely: the first intrusion detection module and the second intrusion detection module) generates the point-to-point network flow information, and provides the point-to-point network flow information to the corresponding preset device. For example, with respect to the acquired network flow information of the electronic device accessing the first intrusion detection module, the part of the network flow information is provided to the first intrusion detection module for subsequent analysis and processing. It can be seen that the present invention can accurately obtain the point-to-point flow information between the electronic device and each intrusion detection module through the bridging method, so as to facilitate the determination of the network behavior performed by the electronic device for each intrusion detection module.

通过分析上述获取到的网络流量信息,能够获知电子设备的网络访问行为(例如,打开的网页数量和网页地址等)。可选的,在本实施例中,网络传输模块还能够根据预设的预警规则确定是否针对电子设备的网络访问行为触发预警信号,从而实现预警作用。预警规则包括多个网络安全等级的预警规则,相应地,网络传输模块首先要确定当前的网络安全等级,然后,选择与当前的网络安全等级相匹配的预警规则。例如,可以将网络安全等级分为三个安全等级:高安全等级、中安全等级、以及低安全等级,相应地,分别为每种安全等级设定对应的预警规则。系统运营人员可以根据当前业务的需求设置网络安全等级。相应地,预警规则可以包括以下三种规则中的至少一个:By analyzing the network traffic information obtained above, the network access behavior of the electronic device (for example, the number of opened web pages and the address of the web page, etc.) can be known. Optionally, in this embodiment, the network transmission module can also determine whether to trigger an early warning signal for the network access behavior of the electronic device according to a preset early warning rule, so as to realize the early warning function. The warning rules include warning rules of multiple network security levels. Correspondingly, the network transmission module first determines the current network security level, and then selects an early warning rule that matches the current network security level. For example, the network security level can be divided into three security levels: a high security level, a medium security level, and a low security level, and accordingly, corresponding warning rules are set for each security level. System operators can set network security levels according to current business needs. Correspondingly, the early warning rule may include at least one of the following three rules:

第一种预警规则为:当监测到通过预设扫描工具实施扫描行为时进行预警的规则。其中,网络传输模块可以预先获取黑客常用的扫描工具,并将获取到的扫描工具存储到黑客工具列表中,一旦根据网络流量信息监测到电子设备利用黑客工具列表中的扫描工具实施扫描的行为则进行预警。其中,黑客工具列表中存储的扫描工具可以包括:NMAP、SQLMAP、WVS等。第二种预警规则为:当监测到针对无线网络内的预设设备实施试探性连接的行为时进行预警的规则。该规则可应用于高安全等级的网络设置中,通过该规则,只要发现试图连接入侵检测模块等预设设备的行为则进行预警。第三种预警规则为:当监测到针对无线网络内的预设设备连接成功的行为时进行预警的规则。该规则可应用于中安全等级或低安全等级的网络设置中,通过该规则,只有发现连接成功的行为时才进行预警。例如,当检测到针对入侵检测模块触发的访问请求时则触发预警。The first warning rule is: a rule for giving a warning when a scanning behavior is detected through a preset scanning tool. Among them, the network transmission module can pre-acquire the scanning tools commonly used by hackers, and store the obtained scanning tools in the hacking tool list. Forewarning. Wherein, the scanning tools stored in the hacking tool list may include: NMAP, SQLMAP, WVS, and the like. The second warning rule is: a rule for giving a warning when a tentative connection to a preset device in the wireless network is detected. This rule can be applied to high-security network settings. Through this rule, as long as an attempt to connect to a preset device such as an intrusion detection module is found, an early warning will be given. The third warning rule is: a rule for giving a warning when a successful connection to a preset device in the wireless network is detected. This rule can be applied to network settings with medium security level or low security level. Through this rule, an alert will be issued only when a successful connection is found. For example, when an access request triggered by an intrusion detection module is detected, an alert is triggered.

由此可见,网络传输层能够监测全网范围内的网络流量信息,并根据监测结果进行预警,以提升系统的安全性。其中,预警规则可由本领域技术人员灵活设置,本发明对此不做限定。It can be seen that the network transport layer can monitor the network traffic information in the whole network, and give early warning according to the monitoring results, so as to improve the security of the system. Wherein, the early warning rule can be flexibly set by those skilled in the art, which is not limited in the present invention.

可选的,为了获取到电子设备的更多信息,在本实施例中,网络传输模块还可以进一步实施以下操作:根据电子设备产生的网络流量信息,拦截电子设备发送的网站访问请求,在拦截到的网站访问请求中插入用于访问预设网站的预设访问脚本;接收与预设网站相对应的访问结果数据,根据该访问结果数据确定电子设备的设备属性信息。相应地,网络传输模块也可以进一步根据设备属性信息定位电子设备。具体实施时,首先,预先设置待拦截的网站访问请求的类型,例如,可以设置为针对百度等搜索类网站的访问请求进行拦截等。然后,在拦截到的网站访问请求中插入用于访问预设网站的预设访问脚本。其中,该预设访问脚本可由第一入侵检测模块负责生成并维护,网络传输模块只需调用该脚本即可。该预设访问脚本可以通过JS脚本或URL网址实现,用于访问人人网、微博等社交类型的网站。最后,接收与预设网站相对应的访问结果数据,根据该访问结果数据确定电子设备的设备属性信息,其中,确定设备属性信息的操作可由第一入侵检测模块实现,相应地,网络传输模块将接收到的预设网站反馈的访问结果数据发送给第一入侵检测模块,以供第一入侵检测模块结合该访问结果数据确定电子设备的设备属性信息。由此可见,网络传输模块在上述过程中主要实现了以下功能:一方面,代替用户向预设网站的服务器发送针对预设网站的访问请求;另一方面,代替用户接收服务器返回的访问结果。因此,网络传输模块可以在入侵无线网络的电子设备的用户毫不知情的情况下访问预设网站并获取访问结果,进而获取电子设备的相关信息。其中,设备属性信息与设备接入信息的主要区别在于:二者获取的时机以及获取的主体不同。具体地,设备接入信息在接入阶段由无线接入模块获取,而设备属性信息则在电子设备渗透到无线网络中并访问第一入侵检测模块时,由第一入侵检测模块获取,用于反映设备的属性信息。实际情况中,设备接入信息与设备属性信息的内容可以存在交叉。Optionally, in order to obtain more information about the electronic device, in this embodiment, the network transmission module can further implement the following operations: intercept the website access request sent by the electronic device according to the network traffic information generated by the electronic device, and intercept the Inserting a preset access script for accessing a preset website into the received website access request; receiving access result data corresponding to the preset website, and determining device attribute information of the electronic device according to the access result data. Correspondingly, the network transmission module can also further locate the electronic device according to the device attribute information. During specific implementation, firstly, the type of website access requests to be intercepted is set in advance, for example, it may be set to intercept access requests for search websites such as Baidu. Then, a preset access script for accessing a preset website is inserted into the intercepted website access request. Wherein, the preset access script can be generated and maintained by the first intrusion detection module, and the network transmission module only needs to call the script. The preset access script can be realized by JS script or URL address, and is used to access social networking sites such as Renren.com and Weibo. Finally, receive the access result data corresponding to the preset website, determine the device attribute information of the electronic device according to the access result data, wherein the operation of determining the device attribute information can be realized by the first intrusion detection module, and correspondingly, the network transmission module will The received access result data fed back by the preset website is sent to the first intrusion detection module for the first intrusion detection module to determine the device attribute information of the electronic device in combination with the access result data. It can be seen that the network transmission module mainly realizes the following functions in the above process: on the one hand, instead of the user, it sends an access request for the preset website to the server of the preset website; on the other hand, it replaces the user to receive the access result returned by the server. Therefore, the network transmission module can visit the preset website and obtain the access result without the user of the electronic device invading the wireless network knowing, and then obtain the relevant information of the electronic device. Among them, the main difference between the device attribute information and the device access information lies in that the timing and subjects of obtaining the two are different. Specifically, the device access information is obtained by the wireless access module during the access phase, and the device attribute information is obtained by the first intrusion detection module when the electronic device infiltrates into the wireless network and accesses the first intrusion detection module. Reflect the attribute information of the device. In actual situations, the contents of the device access information and the device attribute information may overlap.

三、第一入侵检测模块3. The first intrusion detection module

第一入侵检测模块位于网络传输层与第二入侵检测模块之间,用于分析网络传输模块提供的网络流量信息,根据分析结果确定电子设备的设备属性信息。具体实施时,第一入侵检测模块可通过多种实现方式实现,例如,可以利用蜜罐技术通过虚拟机或沙箱来实现。蜜罐技术本质上是一种对攻击者进行欺骗的技术,通过布置一些作为诱饵的主机、网络服务或者信息,诱使攻击者对它们实施攻击,从而可以对攻击行为进行捕获和分析,了解攻击者所使用的工具与方法,推测攻击意图和动机,能够让防御方清晰地了解自身所面对的安全威胁,并通过技术和管理手段来增强实际系统的安全防护能力。在本实施例中,第一入侵检测模块为web型蜜罐(即:服务型蜜罐),并且,第一入侵检测模块的交互性低于第二入侵检测模块,因此,也可以将第一入侵检测模块称作Web型低交互性入侵检测模块。在下文中,为了描述方便,将第一入侵检测模块称作Web型低交互性蜜罐。The first intrusion detection module is located between the network transmission layer and the second intrusion detection module, and is used for analyzing the network flow information provided by the network transmission module, and determining the device attribute information of the electronic device according to the analysis result. During specific implementation, the first intrusion detection module can be realized in various ways, for example, it can be realized through a virtual machine or a sandbox by using honeypot technology. Honeypot technology is essentially a technology to deceive attackers. By arranging some hosts, network services or information as bait, it can entice attackers to attack them, so that the attack behavior can be captured and analyzed, and the attack behavior can be understood. The tools and methods used by attackers, speculating on attack intentions and motivations can enable defenders to clearly understand the security threats they face, and enhance the security protection capabilities of actual systems through technical and management means. In this embodiment, the first intrusion detection module is a web-type honeypot (ie: a service-type honeypot), and the interactivity of the first intrusion detection module is lower than that of the second intrusion detection module. Therefore, the first intrusion detection module can also be The intrusion detection module is called a Web-type low-interaction intrusion detection module. Hereinafter, for convenience of description, the first intrusion detection module is called a Web-type low-interaction honeypot.

Web型低交互性蜜罐能够获取入侵无线网络的电子设备所产生的网络流量信息;针对该网络流量信息进行分析,根据分析结果确定电子设备的设备标识以及与该设备标识相对应的设备属性信息。可选的,Web型低交互性蜜罐还能够根据设备属性信息检测电子设备的位置信息,以便对电子设备进行定位或溯源。由此可见,Web型低交互性蜜罐主要用于进一步收集攻击者的信息。具体地,可供收集的设备属性信息包括但不限于:浏览器版本、操作系统版本、设备屏幕分辨率、浏览器插件信息、社交账号信息、设备指纹、插件信息、时区信息、GPU信息、以及设备语言信息等。The web-type low-interaction honeypot can obtain the network traffic information generated by the electronic device invading the wireless network; analyze the network traffic information, and determine the device identification of the electronic device and the device attribute information corresponding to the device identification according to the analysis results . Optionally, the web-type low-interaction honeypot can also detect the location information of the electronic device according to the device attribute information, so as to locate or trace the electronic device. It can be seen that the web-type low-interaction honeypot is mainly used to further collect attacker information. Specifically, the device attribute information that can be collected includes, but is not limited to: browser version, operating system version, device screen resolution, browser plug-in information, social account information, device fingerprints, plug-in information, time zone information, GPU information, and Device language information, etc.

另外,为了便于收集更多信息,Web型低交互性蜜罐进一步用于:预先生成用于访问预设网站的预设访问脚本;其中,预设访问脚本用于插入拦截到的电子设备发送的网站访问请求中。相应地,Web型低交互性蜜罐根据分析结果确定电子设备的设备标识以及与该设备标识相对应的设备属性信息时,结合获取到的与预设网站相对应的访问结果数据确定电子设备的设备属性信息。其中,预设网站包括:通过社交账号登录的社交网站等,该预设访问脚本可以通过JS脚本或URL网址实现,用于访问人人网、微博等预设网站。相应地,电子设备的设备属性信息包括:根据针对社交网站产生的访问结果确定的社交账号信息。也就是说,Web型低交互性蜜罐负责维护预设访问脚本,以供网络传输模块调用;并且,Web型低交互性蜜罐进一步用于分析网络传输模块得到的网络流量信息以及访问结果数据等,以便确定电子设备的设备属性信息。由此可见,通过Web型低交互性蜜罐以及网络传输模块的相互配合,能够在电子设备的使用者毫无察觉的情况下自动访问预设网站并获取相关信息,为后续的攻击者定位及溯源等操作提供了更多有价值的信息。In addition, in order to facilitate the collection of more information, the web-type low-interaction honeypot is further used to: pre-generate a preset access script for accessing a preset website; wherein, the preset access script is used to insert the intercepted electronic device sent Website access request in progress. Correspondingly, when the web-type low-interaction honeypot determines the device ID of the electronic device and the device attribute information corresponding to the device ID based on the analysis results, it combines the obtained access result data corresponding to the preset website to determine the device ID of the electronic device. Device attribute information. Wherein, the preset website includes: a social networking website logged in through a social account, and the like, and the preset access script can be implemented through a JS script or a URL address, and is used to access preset websites such as Renren.com and Weibo. Correspondingly, the device attribute information of the electronic device includes: social account information determined according to the visit result generated for the social networking site. That is to say, the web-type low-interaction honeypot is responsible for maintaining preset access scripts for calling by the network transmission module; and, the web-type low-interaction honeypot is further used to analyze the network traffic information and access result data obtained by the network transmission module etc., so as to determine the device attribute information of the electronic device. It can be seen that through the cooperation of the web-type low-interaction honeypot and the network transmission module, the user of the electronic device can automatically visit the default website and obtain relevant information without the user noticing, so as to locate and provide information for subsequent attackers. Operations such as traceability provide more valuable information.

四、第二入侵检测模块4. The second intrusion detection module

第二入侵检测模块位于整个系统的最内层,用于获取电子设备的行为特征信息,当确定行为特征信息符合预设报警规则时,生成入侵报警信号。具体实施时,第二入侵检测模块也可通过多种实现方式实现,例如,可以利用蜜罐技术通过虚拟机或沙箱来实现。在本实施例中,第二入侵检测模块的交互性高于第一入侵检测模块,因此,也可以将第二入侵检测模块称作高交互性入侵检测模块。另外,第二入侵检测模块既可以应用于Windows系统,也可以应用于Linux系统,相应地,第二入侵检测模块的种类可以分为两种,分别是Windows型高交互性蜜罐和Linux型高交互性蜜罐。在本实施例中,主要以Windows型高交互性蜜罐为例进行介绍。The second intrusion detection module is located at the innermost layer of the entire system, and is used to obtain behavior characteristic information of electronic equipment, and generate an intrusion alarm signal when it is determined that the behavior characteristic information conforms to preset alarm rules. During specific implementation, the second intrusion detection module can also be implemented through various implementation methods, for example, it can be implemented through a virtual machine or a sandbox by using honeypot technology. In this embodiment, the interactivity of the second intrusion detection module is higher than that of the first intrusion detection module, therefore, the second intrusion detection module can also be called a highly interactive intrusion detection module. In addition, the second intrusion detection module can be applied to both the Windows system and the Linux system. Correspondingly, the second intrusion detection module can be divided into two types, which are Windows-type high-interaction honeypots and Linux-type high-interaction honeypots. Interactive honeypot. In this embodiment, the Windows-type high-interaction honeypot is mainly used as an example for introduction.

具体地,Windows型高交互性蜜罐获取到的电子设备的行为特征信息可以包括多种,相应地,预设报警规则也可以包括多种规则:Specifically, the behavior characteristic information of the electronic equipment obtained by the Windows-type high-interaction honeypot may include multiple types, and correspondingly, the preset alarm rules may also include multiple types of rules:

第一种规则为:确定行为特征信息是否与预设黑名单中存储的恶意命令匹配,若是,则生成入侵报警信号(也叫行为入侵报警信号)。具体地,Windows型高交互性蜜罐监视系统活动以及电子设备的各项行为,若监测到电子设备执行了预设黑名单中存储的恶意命令时,则触发入侵报警信号。其中,预设黑名单用于存储预先确定的黑客常用的各项攻击命令。表1、表2和表3示出了黑名单中存储的部分恶意命令的示意图。The first rule is: determine whether the behavior characteristic information matches the malicious command stored in the preset blacklist, and if so, generate an intrusion alarm signal (also called behavior intrusion alarm signal). Specifically, the Windows-type high-interaction honeypot monitors system activities and various behaviors of electronic equipment, and if it detects that the electronic equipment executes malicious commands stored in the preset blacklist, it will trigger an intrusion alarm signal. Wherein, the preset blacklist is used to store predetermined attack commands commonly used by hackers. Table 1, Table 2 and Table 3 show schematic diagrams of some malicious commands stored in the blacklist.

表1Table 1

顺序order 命令Order 执行次数Execution times 选项options 11 tasklisttask list 119119 /s/v/s/v 22 verver 9292 33 ipconfigipconfig 5858 /all/all 44 Net timenet time 3030 55 systeminfosysteminfo 24twenty four 66 netstatnetstat 22twenty two -ano-ano 77 qprocessqprocess 1515 88 queryquery 1414 useruser 99 whoamiwhoami 1414 /all/all 1010 Net startNet start 1010 1111 nslookupnslookup 44 1212 fsutilfsutil 33 Fsinfo drivesFsinfo drives 1313 timetime 22 /t/t 1414 setset 11

表2Table 2

表3table 3

顺序order 命令Order 执行次数Execution times 选项options 11 atat 9898 22 regreg 2929 Add export queryAdd export query 33 wmicwmic 24twenty four 44 Netsh advfirewallNetsh adv firewall 44 55 scsc 44 Qc queryQc query 66 wusawusa 22

第二种规则为:将电子设备操作过的文件记录到预设的操作文件列表中,将与操作文件列表中的文件存在预设关联关系的文件记录到预设的可疑文件列表中,通过监测操作文件列表以及可疑文件列表中的文件来确定是否生成入侵报警信号(也叫文件入侵报警信号)。例如,当监测到可疑文件列表中的文件被执行时,生成文件入侵报警信号。该规则也可以称作污点追踪技术,主要思想在于:持续监测并追踪与电子设备有关的所有文件,并在发现可疑情况时报警。The second rule is: record the files operated by the electronic device into the preset operation file list, and record the files that have a preset association relationship with the files in the operation file list into the preset suspicious file list. Operate the files in the file list and the suspicious file list to determine whether to generate an intrusion alarm signal (also called a file intrusion alarm signal). For example, when a file in the suspicious file list is detected to be executed, a file intrusion alarm signal is generated. This rule can also be called taint tracking technology. The main idea is to continuously monitor and track all files related to electronic equipment, and call the police when suspicious situations are found.

例如,可以监视文件的创建、修改、删除等各类操作,将这些文件全部作为电子设备操作过的文件记录到预设的操作文件列表中。由此可见,操作文件列表用于记录电子设备直接操作过的所有文件,操作类型包括多种类型。另外,进一步确定与操作文件列表中的文件存在预设关联关系的文件。其中,存在预设关联关系的文件包括但不限于:与操作文件列表中的文件存在捆绑关系的文件。举例而言,若电子设备在创建文件A的同时,进一步创建了文件A的捆绑文件A’,相应地,将文件A记录到操作文件列表中,将文件A’记录到可疑文件列表中。并且,在后续过程中,持续针对操作文件列表以及可疑文件列表进行监测。一旦监测到可疑文件列表中的文件被执行则立刻报警。也就是说,操作文件列表中的文件时电子设备直接操作的文件,而可疑文件列表中的文件则是电子设备尚未操作或尚未直接操作(可能间接操作或隐含操作)的文件。将这两类文件分别存储在不同的列表中,便于根据每种文件的特点分别为其设定不同的监测方式及报警方式。例如,电子设备之所以要创建捆绑文件,其目的往往是为了规避针对操作文件列表的监测操作,通常,捆绑文件不出现在桌面系统中,并非真实的文件,只在内存中存在,因此,具有更强的隐蔽性,但是,一旦该类文件得以执行则会对系统造成危害。为此,在本实施例中将捆绑文件、隐藏文件等关联文件单独存储到可疑文件列表中,便于对该部分文件实施更强监控力度的监控,以防止其实施恶意行为。For example, various operations such as creation, modification, and deletion of files can be monitored, and all these files can be recorded in the preset operation file list as files operated by the electronic device. It can be seen that the operation file list is used to record all files directly operated by the electronic device, and the operation types include multiple types. In addition, the files that have a preset association relationship with the files in the operation file list are further determined. Wherein, the files having the preset association relationship include but not limited to: the files having the binding relationship with the files in the operation file list. For example, if the electronic device further creates a bundled file A' of file A while creating file A, correspondingly, file A is recorded in the operation file list, and file A' is recorded in the suspicious file list. And, in the follow-up process, the operation file list and the suspicious file list are continuously monitored. Once the file in the list of suspicious files is detected to be executed, it will report to the police immediately. That is to say, the files in the operation file list are the files directly operated by the electronic equipment, while the files in the suspicious file list are the files that the electronic equipment has not operated or has not directly operated (maybe indirectly or implicitly). These two types of files are stored in different lists, so that different monitoring methods and alarm methods can be set for each file according to its characteristics. For example, the reason why electronic devices create bundled files is often to avoid monitoring operations on the list of operating files. Usually, bundled files do not appear in the desktop system, are not real files, and only exist in memory. Therefore, they have Stronger concealment, but once this type of file is executed, it will cause harm to the system. For this reason, in this embodiment, associated files such as bundled files and hidden files are stored separately in the suspicious file list, so as to facilitate stronger monitoring of these files and prevent them from performing malicious acts.

除此之外,Windows型高交互性蜜罐还可以进一步监视进程的创建,并对可疑进程注入monitor.dll(用于监视进程的动态链接库),以跟踪进程行为。而且,还可以设置进程黑名单,例如,将非系统级进程全部列入进程黑名单中,对进程黑名单中的各个进程进行持续监测,一旦发现危险进程的创建操作则触发报警。另外,Windows型高交互性蜜罐还可以监视注册表操作,以便于发现危险行为。In addition, the Windows-type high-interaction honeypot can further monitor the creation of processes, and inject monitor.dll (a dynamic link library for monitoring processes) into suspicious processes to track process behavior. Moreover, a process blacklist can also be set, for example, all non-system-level processes are included in the process blacklist, and each process in the process blacklist is continuously monitored, and an alarm is triggered once a dangerous process creation operation is found. In addition, Windows-type high-interaction honeypots can also monitor registry operations to find dangerous behaviors.

另外,每个Windows型高交互性蜜罐还可以进行日志、报警信息的处理,并且,还可以实现与第一入侵检测模块或其他Windows型高交互性蜜罐之间的通信,以实现整个系统的联动处理。为此,无线接入模块进一步适于:将电子设备的设备接入信息与电子设备的设备标识关联存储;且第一入侵检测模块进一步适于:将电子设备的设备属性信息与电子设备的设备标识关联存储;则第二入侵检测模块进一步适于:当确定行为特征信息符合预设的报警行为规则时,获取并分析与该电子设备的设备标识关联存储的设备接入信息以及设备属性信息等。也就是说,在本系统中,每个模块针对电子设备获取到的相关信息(包括设备接入信息、设备属性信息以及行为特征信息等)都与该电子设备的设备标识关联存储,相应地,各个模块能够通过设备标识获取到与该设备标识关联存储的全部信息。即:每个模块不仅能够获取到自身确定的信息,还能够获取到其他模块确定的信息,从而实现信息的共享。相应地,第一入侵检测模块和/或第二入侵检测模块还可以进一步适于:根据电子设备的设备接入信息、设备属性信息和/或行为特征信息确定与电子设备相对应的用户标识以及用户特征信息,以便根据用户标识以及用户特征信息进行溯源。In addition, each Windows-type high-interactivity honeypot can also process logs and alarm information, and can also realize communication with the first intrusion detection module or other Windows-type high-interactivity honeypots, so as to realize the overall system linkage processing. To this end, the wireless access module is further adapted to: associate and store the device access information of the electronic device with the device identifier of the electronic device; and the first intrusion detection module is further adapted to: associate the device attribute information of the electronic device with the device identifier of the electronic device Identifier associated storage; then the second intrusion detection module is further adapted to: when it is determined that the behavior feature information conforms to the preset alarm behavior rules, acquire and analyze the device access information and device attribute information stored in association with the device identifier of the electronic device . That is to say, in this system, the relevant information (including device access information, device attribute information, and behavior characteristic information, etc.) obtained by each module for the electronic device is stored in association with the device identifier of the electronic device. Correspondingly, Each module can obtain all information stored in association with the device identifier through the device identifier. That is, each module can obtain not only the information determined by itself, but also the information determined by other modules, so as to realize information sharing. Correspondingly, the first intrusion detection module and/or the second intrusion detection module may be further adapted to: determine the user identifier corresponding to the electronic device according to the device access information, device attribute information and/or behavior characteristic information of the electronic device; User characteristic information for traceability based on user identification and user characteristic information.

由此可见,第一入侵检测模块和/或第二入侵检测模块主要用于给攻击者留下突破口,使攻击者有机会登录到系统中;然后,记录攻击者的系统活动,对危险行为进行报警,并捕获恶意行为所对应的样本,以便利用沙箱技术进行分析。It can be seen that the first intrusion detection module and/or the second intrusion detection module are mainly used to leave a breakthrough for the attacker, so that the attacker has the opportunity to log in to the system; Alarm and capture samples corresponding to malicious behaviors for analysis using sandbox technology.

另外,本系统实质上利用了多层环来实现对入侵设备的全面监控,图3示出了本系统中的多层环的结构示意图。如图3所示,本系统从外到内共分为三层环,位于最外层的环3主要由无线接入模块构成,位于中间的环2主要由第一入侵检测模块构成,位于最内层的环1主要由第二入侵检测模块构成。网络传输模块介于环3与环2之间。由此可见,本系统通过多层环的设计方式诱使攻击者逐环渗入,并泄露更多的信息;并且,各环内收集到的信息可以联动查询。In addition, the system essentially uses multi-layer rings to realize comprehensive monitoring of intrusion devices, and FIG. 3 shows a schematic structural diagram of the multi-layer rings in the system. As shown in Figure 3, the system is divided into three layers of rings from the outside to the inside. The outermost ring 3 is mainly composed of wireless access modules, and the middle ring 2 is mainly composed of the first intrusion detection module. The inner ring 1 is mainly composed of the second intrusion detection module. The network transmission module is between ring 3 and ring 2. It can be seen that the system uses the design method of multi-layer rings to lure attackers to infiltrate ring by ring and leak more information; moreover, the information collected in each ring can be linked and queried.

另外,环2和环3中的第一入侵检测模块以及第二入侵检测模块均为安装有真实操作系统的虚拟机,以便于更好的收集信息。并且,为了防止入侵的电子设备识破蜜罐机制,虚拟机的指纹特征信息通过运行于系统层的预设程序插件进行管理;其中,指纹特征信息包括:网卡信息、注册表信息和/或键值信息等。其中,指纹特征信息属于环境特征信息的一种。并且,该程序插件运行于系统层,其运行权限大于电子设备中的其他进程的权限,因此,可以有效避免其他进程访问虚拟机的指纹特征信息。In addition, both the first intrusion detection module and the second intrusion detection module in ring 2 and ring 3 are virtual machines installed with a real operating system, so as to collect information better. Moreover, in order to prevent intruding electronic devices from seeing through the honeypot mechanism, the fingerprint feature information of the virtual machine is managed through a preset program plug-in running at the system layer; wherein, the fingerprint feature information includes: network card information, registry information and/or key values information etc. Wherein, the fingerprint characteristic information belongs to a kind of environment characteristic information. Moreover, the program plug-in runs at the system layer, and its running authority is greater than that of other processes in the electronic device, so it can effectively prevent other processes from accessing the fingerprint feature information of the virtual machine.

具体实施时,为了对第一入侵检测模块以及第二入侵检测模块内部的虚拟化环境进行防护,以防止电子设备识破,第一入侵检测模块和/或第二入侵检测模块还可以进一步执行以下操作:当监测到用于访问虚拟化环境的环境特征信息的访问请求消息时,拦截该访问请求消息;确定与该访问请求消息相对应的访问结果数据,并确定访问结果数据的数据类型;查询与访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对该访问请求消息进行防护处理。During specific implementation, in order to protect the virtualization environment inside the first intrusion detection module and the second intrusion detection module, so as to prevent electronic devices from being seen through, the first intrusion detection module and/or the second intrusion detection module can further perform the following operations : When monitoring an access request message for accessing the environment feature information of the virtualized environment, intercept the access request message; determine the access result data corresponding to the access request message, and determine the data type of the access result data; query and The data type of the access result data matches the protection strategy, and the access request message is protected and processed according to the queried protection strategy.

具体地,需要预先确定用于访问虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口(API),针对这些应用程序接口设置挂钩函数;其中,挂钩函数用于监测通过应用程序接口触发的访问请求消息。其中,虚拟化环境的环境特征信息包括与系统环境相关的所有特征,例如,包括上述的虚拟机的指纹特征信息。在确定用于访问虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口时,可以监测入侵虚拟化环境的电子设备针对虚拟化环境发出的访问行为,根据访问行为确定用于访问所述虚拟化环境的环境特征信息的访问请求消息。举例而言,由于入侵虚拟化环境的电子设备往往会有意识地获取虚拟化环境的环境特征信息,以便确定当前的系统环境是否为通过蜜罐技术实现的虚拟化环境,一旦电子设备发现当前的系统环境是通过蜜罐技术实现的虚拟化环境,则会离开当前环境。因此,通过监测电子设备的访问行为,能够确定电子设备常用于获取虚拟化环境的环境特征信息的访问请求消息所对应的API,并针对这些API进行监控。例如,在本实施例中,通过监测电子设备的访问行为发现,电子设备检测虚拟机时一般通过以下几种手段实现:检测执行环境中的特定CPU指令、检测执行环境中的特定注册表信息及配置信息、检测执行环境中的特定进程和服务、检测执行环境中的文件系统和特定硬件信息(MAC地址、硬盘)、检测执行环境中的内存特征、检测执行环境的配置(硬盘大小、内存大小、CPU核数等)。另外,由于本实施例中的入侵检测模块还可以通过沙盒实现,因此,通过监测电子设备的访问行为发现,电子设备检测沙盒时一般通过以下几种手段实现:检测执行环境中是否有特定的用户活动(比如鼠标移动,访问某个网址等)、Sleep一段时间再执行、循环延迟执行、检测挂钩Hook(包括:用户Hook、内核Hook等)、检测网络连通性、检测用户名称、只在特定日期执行、检测时间加速、结束分析工具执行、检测浏览器记录、运行程序、安装的程序等。并且,电子设备通常会利用多种手段的组合来实现虚拟机和沙箱的检测操作,为此,本实施例通过预先监测电子设备的上述操作,确定出上述操作所对应的访问请求消息及其对应的API,相应地,在该API处设置挂钩函数,以便截获并处理通过该API发送的访问请求消息。Specifically, it is necessary to predetermine the application program interface (API) corresponding to the access request message for accessing the environment feature information of the virtualized environment, and set hook functions for these APIs; wherein, the hook function is used to monitor Triggered access request message. Wherein, the environment characteristic information of the virtualization environment includes all characteristics related to the system environment, for example, includes the above-mentioned fingerprint characteristic information of the virtual machine. When determining the application program interface corresponding to the access request message used to access the environment feature information of the virtualized environment, the access behavior sent by the electronic device invading the virtualized environment for the virtualized environment can be monitored, and the An access request message describing the environment characteristic information of the virtualization environment. For example, since electronic devices invading a virtualized environment often consciously obtain environmental characteristic information of the virtualized environment in order to determine whether the current system environment is a virtualized environment realized through honeypot technology, once the electronic device discovers the current system The environment is a virtualized environment implemented by honeypot technology, and it will leave the current environment. Therefore, by monitoring the access behavior of the electronic device, it is possible to determine the APIs corresponding to the access request messages that the electronic device often uses to obtain the environment feature information of the virtualized environment, and monitor these APIs. For example, in this embodiment, by monitoring the access behavior of the electronic device, it is generally found that the electronic device detects the virtual machine through the following methods: detecting specific CPU instructions in the execution environment, detecting specific registry information in the execution environment and Configuration information, detection of specific processes and services in the execution environment, detection of file systems and specific hardware information (MAC address, hard disk) in the execution environment, detection of memory characteristics in the execution environment, detection of configuration of the execution environment (hard disk size, memory size) , number of CPU cores, etc.). In addition, since the intrusion detection module in this embodiment can also be implemented through a sandbox, it is found by monitoring the access behavior of the electronic device that the electronic device detects the sandbox generally through the following methods: Detect whether there is a specific User activities (such as mouse movement, access to a certain website, etc.), Sleep for a period of time before execution, loop delay execution, detection hook Hook (including: user Hook, kernel Hook, etc.), detection network connectivity, detection user name, only in Specific date execution, detection time acceleration, end analysis tool execution, detection of browser records, running programs, installed programs, etc. Moreover, electronic devices usually use a combination of various means to implement the detection operations of virtual machines and sandboxes. Therefore, this embodiment determines the access request message corresponding to the above operations and its corresponding Correspondingly, a hook function is set at the API so as to intercept and process the access request message sent through the API.

针对截获到的访问请求消息,确定与该访问请求消息相对应的访问结果数据,并确定访问结果数据的数据类型;查询与访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对该访问请求消息进行防护处理。在本实施例中,预先将访问请求消息相对应的访问结果数据划分为第一类数据类型以及第二类数据类型。For the intercepted access request message, determine the access result data corresponding to the access request message, and determine the data type of the access result data; query the protection strategy that matches the data type of the access result data, and according to the queried protection strategy Protective processing is performed on the access request message. In this embodiment, the access result data corresponding to the access request message is divided into the first data type and the second data type in advance.

其中,第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型。例如,无论是虚拟化环境还是非虚拟化环境,都需要具备网卡信息和注册表信息,因此,将该类信息所对应的访问结果数据作为第一类数据类型。由于该类型的数据是所有环境中都存在的,因此,必须向电子设备返回访问结果,否则会引起电子设备使用者的怀疑。对此,本实施例设置的与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与第一类数据类型的访问结果数据相对应的伪结果数据。也就是说,针对第一类数据类型的访问结果数据,预先确定该数据的数值是否会泄露虚拟化环境的特征,若是,则针对该数据设置对应的伪结果数据,并向电子设备返回对应的伪结果数据。例如,对于物理网卡而言,虽然虚拟化环境和非虚拟化环境都具备物理网卡,但是,两种环境中的网卡特征可能不同,对此,针对网卡的访问结果数据,为其设置相对应的伪结果数据(即与非虚拟化环境一致的数据),一旦电子设备请求网卡数据,则会收到对应的伪结果数据,以使电子设备无法识破虚拟化环境。Wherein, the first type of data type includes: a type corresponding to data existing in both the virtualized environment and the non-virtualized environment. For example, whether it is a virtualized environment or a non-virtualized environment, network card information and registry information are required. Therefore, the access result data corresponding to this type of information is used as the first type of data type. Since this type of data exists in all environments, an access result must be returned to the electronic device, otherwise it will arouse suspicion of the user of the electronic device. In this regard, the protection strategy set in this embodiment that matches the first type of data type includes: pre-setting corresponding fake result data for the access result data of the first type of data type, when the access to the first type of data type is intercepted When an access request message is sent by the result data, dummy result data corresponding to the access result data of the first data type is returned for the access request message. That is to say, for the access result data of the first data type, it is determined in advance whether the value of the data will reveal the characteristics of the virtualization environment, and if so, the corresponding dummy result data is set for the data, and the corresponding fake result data is returned to the electronic device. Dummy result data. For example, for a physical network card, although both the virtualization environment and the non-virtualization environment have physical network cards, the characteristics of the network card in the two environments may be different. For this, for the access result data of the network card, set the corresponding As for the false result data (that is, the data consistent with the non-virtualized environment), once the electronic device requests the network card data, it will receive the corresponding false result data, so that the electronic device cannot see through the virtualized environment.

第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型。由于该类型的数据是仅存在于虚拟化环境中的,因此,一旦向电子设备返回对应的数据则会使电子设备识破虚拟化环境。为此,本实施例中设置的与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。也就是说,对于第二类数据类型所对应的访问请求消息不予返回响应结果,以使电子设备无法获取到用于识别虚拟化环境特征的数据。由此可见,本实施例中的虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。无论是哪种类型的虚拟化环境,都能够通过上述的两种策略实现防护。The second type of data type includes: types corresponding to data available in the virtualized environment and not available in the non-virtualized environment. Since this type of data exists only in the virtualization environment, once the corresponding data is returned to the electronic device, the electronic device will be able to see through the virtualization environment. To this end, the protection strategy set in this embodiment that matches the second type of data type includes: when an access request message sent for the access result data of the second type of data type is intercepted, return an empty message for the access request message . That is to say, no response result is returned to the access request message corresponding to the second type of data, so that the electronic device cannot obtain the data used to identify the characteristics of the virtualized environment. It can be seen that the virtualization environment in this embodiment includes: a virtualization environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox. No matter what type of virtualization environment it is, it can be protected through the above two strategies.

除此之外,本实施例中还可以通过以下方式实现虚拟化环境的防护:(1)利用开源硬件虚拟化软件,源码编译去掉或修改虚拟机特定指纹信息,令电子设备中的恶意软件检测失效;(2)更改沙盒硬件配置使其更像一台真实的机器(可选的还可以通过Hook方式返回虚假配置信息);(3)正常配置系统,安装常用软件,以增加迷惑性;(4)模拟用户正常操作(鼠标点击,网络访问),以防止被电子设备识破;(5)适当增加检测时间;(6)Hook掉一些非正常操作(重启、关机);(7)针对Hook检测做相应的对抗;(8)通过其他能够规避检测的方式配置虚拟网络环境等。In addition, in this embodiment, the protection of the virtualized environment can also be realized in the following ways: (1) using open source hardware virtualization software, source code compilation removes or modifies the specific fingerprint information of the virtual machine, so that the malware in the electronic device can detect Invalid; (2) Change the sandbox hardware configuration to make it more like a real machine (optionally return false configuration information through Hook); (3) Configure the system normally and install common software to increase confusion; (4) Simulate normal user operations (mouse click, network access) to prevent being seen through by electronic devices; (5) Appropriately increase the detection time; (6) Hook off some abnormal operations (restart, shutdown); (7) For Hook (8) Configure the virtual network environment through other methods that can evade detection.

由此可见,本系统中的第一入侵检测模块和第二入侵检测模块能够对虚拟化环境进行隐藏,以防止被电子设备识别出蜜罐环境,从而提升系统的可用性。It can be seen that the first intrusion detection module and the second intrusion detection module in this system can hide the virtualized environment, so as to prevent the honeypot environment from being recognized by the electronic equipment, thereby improving the usability of the system.

另外,本系统还能够根据各个模块收集到的信息实现黑客画像功能,以实现对攻击者的定位。相应地,该系统进一步执行以下操作:当检测到入侵无线网络的电子设备时,记录该电子设备的设备接入信息(即上述无线接入模块实现的功能);获取所述电子设备产生的网络流量信息,根据网络流量信息确定电子设备的设备属性信息以及与电子设备相对应的用户属性信息;将电子设备的设备接入信息、电子设备的设备属性信息以及与电子设备相对应的用户属性信息进行关联分析,根据分析结果确定与电子设备相对应的攻击用户信息;其中,攻击用户信息用于定位攻击者和/或检测电子设备的位置。其中,设备接入信息以及设备属性信息的具体内涵和获取方式均已在上文中予以描述,此处不再赘述。与电子设备相对应的用户属性信息主要是指与攻击者相关的个人行为信息,该部分信息既可以通过设备属性信息确定,也可以根据上文中提到的行为特征信息确定。在本实施例中,用户属性信息可以包括用户身份信息,例如包括:社交账号信息、攻击工具信息、远控木马的上线地址信息、以及后门的登录密码信息。也就是说,在本实施例中,可以将上文提到的设备属性信息中与用户行为相关的信息分离出来作为用户属性信息。In addition, this system can also realize the hacker portrait function according to the information collected by each module, so as to realize the positioning of the attacker. Correspondingly, the system further performs the following operations: when an electronic device intruding into a wireless network is detected, record the device access information of the electronic device (that is, the function realized by the above-mentioned wireless access module); obtain the network information generated by the electronic device Flow information, determine the device attribute information of the electronic device and the user attribute information corresponding to the electronic device according to the network flow information; collect the device access information of the electronic device, the device attribute information of the electronic device, and the user attribute information corresponding to the electronic device Perform correlation analysis, and determine the attacking user information corresponding to the electronic device according to the analysis result; wherein, the attacking user information is used to locate the attacker and/or detect the location of the electronic device. The specific connotations and acquisition methods of the device access information and device attribute information have been described above, and will not be repeated here. The user attribute information corresponding to the electronic device mainly refers to the personal behavior information related to the attacker. This part of the information can be determined not only through the device attribute information, but also based on the behavior characteristic information mentioned above. In this embodiment, the user attribute information may include user identity information, such as: social account information, attack tool information, online address information of a remote control Trojan horse, and backdoor login password information. That is to say, in this embodiment, information related to user behavior in the above-mentioned device attribute information can be separated as user attribute information.

为了便于理解,下面以设备指纹类信息为例,列举几种常见的设备属性信息,具体包括:IP地址、地理位置、网络身份、设备指纹、操作系统、浏览器等。除此之外,设备属性信息还可以通过WebRTC(Web Real-Time Communication,网页实时通信)、UA(User Agent,用户代理)、绘图(Canvas)、分辨率(包括:尺寸、颜色16/24)、插件、时区、语言(language)、GPU(Graphics Processing Unit,图形处理器)、AudioContext等辅助确定。具体地,利用WebRTC协议能够获取内外网的IP地址,即使有VPN(Virtual Private Network,虚拟专用网络)也可以获取到。通过UA能够判断浏览器版本及操作系统版本。另外,绘制Canvas图片时,同样的Canvas绘制代码,在不同机器和浏览器中绘制的图片特征是相同并且独一无二的,基于这一特性,本发明只需提取最简单的CRC(Cyclic Redundancy Code,循环冗余校验)值便可以唯一标识和跟踪一个电子设备及其对应的用户。通过获取攻击者电子设备的分辨率作为辅助条件,能够更加准确地确定电子设备的唯一性。并且,通过获取攻击者电子设备的插件来判断攻击者安装的软件及作为辅助条件,能够更为准确地确定电子设备的唯一性。并且,通过获取攻击者电子设备的时区,能够判断攻击者所属的国家或地区,并作为辅助条件来确定电子设备的唯一性。通过获取攻击者电子设备的GPU型号,能够作为辅助条件来确定电子设备的唯一性。另外,关于上述提到的语言(即language),并不限定于当前浏览器所使用的语言,而是包括系统支持的所有语言,比如中文简体、中文繁体、英语。发明人在实现本发明的过程中发现,现有技术中并没有现成的调用接口来获取系统的语言信息,为了解决这一问题,本实施例中采取如下方式:要求电子设备的使用者在页面中用所有的语言写两个字,如果系统支持该语言,那么就能正常写出来;如果不支持,显示出来的就是方框,通过这种方法即可获取系统支持的语言,进而通过系统支持的语言辅助确定电子设备的唯一性以及电子设备使用者的身份信息。具体实施时,可以通过挂钩函数拦截电子设备发出的预设指令,并通过挂钩函数中设置的分别通过各种语言实现书写的操作逻辑确定系统支持的语言。由此可见,本实施例中的设备属性信息可以包括多种内容,并且,其中的部分信息还可以用于辅助确定用户属性信息。For ease of understanding, the following uses device fingerprint information as an example to list several common device attribute information, including: IP address, geographic location, network identity, device fingerprint, operating system, browser, etc. In addition, device attribute information can also be transmitted through WebRTC (Web Real-Time Communication, web real-time communication), UA (User Agent, user agent), drawing (Canvas), resolution (including: size, color 16/24) , plug-in, time zone, language (language), GPU (Graphics Processing Unit, graphics processor), AudioContext and other auxiliary determination. Specifically, the IP address of the internal and external network can be obtained by using the WebRTC protocol, even if there is a VPN (Virtual Private Network, virtual private network). The browser version and operating system version can be judged through UA. In addition, when drawing a Canvas picture, the same Canvas drawing code has the same and unique characteristics of the picture drawn in different machines and browsers. Based on this feature, the present invention only needs to extract the simplest CRC (Cyclic Redundancy Code, cycle Redundancy check) value can uniquely identify and track an electronic device and its corresponding user. By obtaining the resolution of the attacker's electronic device as an auxiliary condition, the uniqueness of the electronic device can be determined more accurately. Moreover, by obtaining the plug-in of the attacker's electronic device to determine the software installed by the attacker and as an auxiliary condition, the uniqueness of the electronic device can be determined more accurately. Moreover, by obtaining the time zone of the attacker's electronic device, the country or region to which the attacker belongs can be determined, and used as an auxiliary condition to determine the uniqueness of the electronic device. By obtaining the GPU model of the attacker's electronic device, it can be used as an auxiliary condition to determine the uniqueness of the electronic device. In addition, the language mentioned above (namely language) is not limited to the language used by the current browser, but includes all languages supported by the system, such as Simplified Chinese, Traditional Chinese, and English. The inventor found in the process of realizing the present invention that there is no ready-made call interface to obtain the language information of the system in the prior art. In order to solve this problem, the following method is adopted in this embodiment: the user of the electronic device is required to Write two characters in all the languages in , if the system supports the language, then it can be written normally; language assistance to determine the uniqueness of the electronic device and the identity information of the user of the electronic device. During specific implementation, the preset instructions issued by the electronic device can be intercepted through the hook function, and the languages supported by the system can be determined through the operating logic set in the hook function to implement writing in various languages. It can be seen that the device attribute information in this embodiment may include various contents, and part of the information may also be used to assist in determining user attribute information.

下面介绍几种常见的用户属性信息:Several common user attribute information are introduced below:

首先,用户属性信息包括用户身份信息。例如,包括通过上文提到的方式获取到的用户账号信息。其中,用户账号信息包括用户在各大网站注册的账号及对应的密码信息。除用户账号信息外,还可以包括其他各类能够反映用户身份的信息。First, user attribute information includes user identity information. For example, it includes the user account information obtained through the methods mentioned above. Among them, the user account information includes the account number and corresponding password information registered by the user on various websites. In addition to user account information, it may also include other types of information that can reflect the identity of the user.

其次,用户属性信息还包括用户行为信息,该用户行为信息主要用于确定攻击者的攻击工具及攻击手法。具体地,捕获攻击者使用的攻击工具及攻击手法,提取工具中的特征,如:URL、IP、样本的MD5、远控木马的上线地址、后门的登录密码等;通过上述特征来确定两个攻击者是否为同一个人,并且,还能够确定攻击者的等级。例如,同一个攻击者,其每次登陆后下载的样本是相同的,因此,样本的MD5必然也相同。并且,同一个攻击者,其远控木马的上线地址以及后门的登录密码必然也相同。相应地,通过上述信息即可唯一地确定一个攻击者。Secondly, the user attribute information also includes user behavior information, which is mainly used to determine the attacker's attack tool and attack method. Specifically, capture the attack tool and attack method used by the attacker, and extract the features in the tool, such as: URL, IP, MD5 of the sample, the online address of the remote control Trojan, the login password of the back door, etc.; use the above features to determine two Whether the attacker is the same person, and it is also possible to determine the level of the attacker. For example, the same attacker downloads the same sample after each login, so the MD5 of the sample must also be the same. Moreover, for the same attacker, the online address of the remote control Trojan horse and the login password of the back door must be the same. Correspondingly, an attacker can be uniquely determined through the above information.

在得到上述的设备接入信息、设备属性信息以及用户属性信息之后,将上述信息进行关联分析,根据分析结果确定与该电子设备相对应的攻击用户信息。所谓关联分析,是指根据设备标识将上述的各项信息关联到一起后进行分析。由于同一个用户的设备接入信息、设备属性信息以及用户属性信息所对应的设备标识均相同,因此,通过设备标识可以将同一个用户的各项信息相互关联,并将关联后得到的结果作为攻击用户信息。After obtaining the above-mentioned device access information, device attribute information, and user attribute information, perform correlation analysis on the above-mentioned information, and determine the attacking user information corresponding to the electronic device according to the analysis result. The so-called association analysis refers to performing analysis after associating the above-mentioned items of information together according to the device identification. Since the device access information, device attribute information, and user attribute information of the same user correspond to the same device identifier, the information of the same user can be associated with each other through the device identifier, and the result obtained after the association can be used as Attack user information.

接下来,在根据分析结果确定与电子设备相对应的攻击用户信息之后,进一步设置与攻击用户信息相对应的攻击用户标识,将攻击用户信息与攻击用户标识作为一条数据记录关联存储到预设的攻击用户列表中。这里,攻击用户标识与设备标识的区别在于:设备标识主要用于唯一地确定一个电子设备,因此,设备标识与电子设备的硬件特征相互关联,例如,一个电子设备的显卡、分辨率、网卡等硬件特征是不变的,因此,设备标识主要用于标识一个电子设备本身。然而,攻击用户标识主要用于唯一地确定一个攻击者,通常情况下,一个攻击者各次攻击时所使用的电子设备是相同的,因此,通常情况下,设备标识与攻击用户标识的作用可相互替代。但是,不排除某些特殊情况下,一个攻击者各次攻击时所使用的电子设备不同,此时,设备标识与攻击用户标识的内涵和作用则截然不同。通俗的说,攻击用户标识与攻击者的用户属性信息相互关联,例如,同一个攻击者的社交账号信息是不变的,且同一个攻击者的攻击手法和攻击工具是固定不变的,因此,攻击用户标识主要用于标识一个攻击者本身。Next, after determining the attacking user information corresponding to the electronic device according to the analysis results, the attacking user identification corresponding to the attacking user information is further set, and the attacking user information and the attacking user identification are associated and stored as a data record in the preset attack user list. Here, the difference between the attacking user ID and the device ID is that the device ID is mainly used to uniquely identify an electronic device. Therefore, the device ID is related to the hardware characteristics of the electronic device, for example, the graphics card, resolution, network card, etc. of an electronic device. Hardware features are invariant, therefore, device identification is mainly used to identify an electronic device itself. However, the attacking user ID is mainly used to uniquely determine an attacker. Usually, an attacker uses the same electronic device for each attack. Therefore, in general, the role of the device ID and the attacking user ID can be replace each other. However, it does not rule out that in some special cases, an attacker uses different electronic devices for each attack. At this time, the connotation and function of the device identification and the attacking user identification are completely different. In layman's terms, the attacking user ID is related to the attacker's user attribute information. For example, the same attacker's social account information is unchanged, and the same attacker's attack methods and attack tools are fixed. Therefore, , the attacking user ID is mainly used to identify an attacker himself.

具体实施时,可以将设备接入信息以及设备属性信息作为与设备标识一一对应的信息,将用户属性信息作为与攻击用户标识一一对应的信息。相应地,通过本发明中的方式,不仅能够唯一地确定一个电子设备,还能够唯一地确定一个攻击者,从而既可以实现对电子设备的定位,还可以实现对攻击者的信息收集和查找。During specific implementation, the device access information and device attribute information may be used as information corresponding to the device ID one-to-one, and the user attribute information may be used as information corresponding to the attacking user ID one-to-one. Correspondingly, through the method of the present invention, not only can an electronic device be uniquely determined, but also an attacker can be uniquely determined, so that both the positioning of the electronic device and the information collection and search of the attacker can be realized.

相应地,在根据分析结果确定与电子设备相对应的攻击用户信息时,进一步查询该攻击用户列表中是否包含与分析结果相匹配的数据记录;若是,根据分析结果更新该数据记录。具体地,分别针对攻击用户列表中的每条数据记录,确定该数据记录中是否包含与分析结果中的信息项取值相同的信息项;若是,判断该取值相同的信息项的名称和/或数量是否符合预设匹配规则,若是,确定该数据记录与分析结果相匹配。通过该种方式即可通过攻击用户列表存储各个攻击者的信息,并针对攻击者进行定位和查询,从而提升系统的安全性。Correspondingly, when the attacking user information corresponding to the electronic device is determined according to the analysis result, it is further inquired whether the attacking user list contains a data record matching the analysis result; if so, the data record is updated according to the analysis result. Specifically, for each data record in the attacking user list, determine whether the data record contains an information item with the same value as the information item in the analysis result; if so, determine the name and/or name of the information item with the same value or whether the quantity meets the preset matching rules, and if so, determine that the data record matches the analysis result. In this way, the information of each attacker can be stored through the attacking user list, and the attacker can be located and queried, thereby improving the security of the system.

综上可知,通过本发明提供的系统,能够诱使攻击者进入蜜罐,并暴露相关信息。系统中的各个模块以逐层递进的方式收集多方面的信息,并且,这些信息可以联动查询。该系统还支持通过短信或邮件等方式进行攻击告警。而且,还可以通过定位攻击者位置以及制止攻击行为等方式实现应急处理。除此之外,该系统还能够通过查看攻击日志实现溯源、取证分析等目的。In summary, the system provided by the present invention can lure attackers into the honeypot and expose relevant information. Each module in the system collects various information in a layer-by-layer manner, and the information can be linked and queried. The system also supports attack alerts via text messages or emails. Moreover, emergency treatment can also be achieved by locating the location of the attacker and stopping the attack. In addition, the system can also achieve source tracing and forensic analysis by viewing attack logs.

另外,本实施例中的系统的第二入侵检测模块是以Windows型高交互性蜜罐为例进行介绍的,实质上,该系统中的第二入侵检测模块还可以是Linux型高交互性蜜罐。另外,系统中的各个模块可以运行于同一台硬件设备上,相应地,该系统中的各个模块也可以合并为更少的模块(例如合并为一个模块),或拆分为更多的模块,本发明对该系统的具体实现方式不做限定。In addition, the second intrusion detection module of the system in this embodiment is introduced by taking the Windows-type high-interactivity honeypot as an example. In essence, the second intrusion detection module in the system can also be a Linux-type high-interactivity honeypot. Can. In addition, each module in the system can run on the same hardware device. Correspondingly, each module in the system can also be combined into fewer modules (for example, merged into one module), or split into more modules. The present invention does not limit the specific implementation of the system.

综上可知,本发明中的虚拟化环境的防护方法可由上述系统中的第一入侵检测模块和/或第二入侵检测模块实现。相应地,关于本发明中的虚拟化环境的防护方法中的具体细节可参照上述系统中相应部分的描述。To sum up, it can be seen that the protection method of the virtualized environment in the present invention can be realized by the first intrusion detection module and/or the second intrusion detection module in the above system. Correspondingly, for the specific details of the protection method of the virtualized environment in the present invention, reference may be made to the description of the corresponding part in the above system.

图4示出了本发明另一个实施例提供的一种虚拟化环境的防护装置的结构示意图,如图4所示,该装置包括:Fig. 4 shows a schematic structural diagram of a protection device for a virtualized environment provided by another embodiment of the present invention. As shown in Fig. 4, the device includes:

拦截模块41,适于当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;The interception module 41 is adapted to intercept the access request message when monitoring the access request message for accessing the environment feature information of the virtualized environment;

确定模块42,适于确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;A determining module 42, adapted to determine the access result data corresponding to the access request message, and determine the data type of the access result data;

防护模块43,适于查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。The protection module 43 is adapted to query a protection policy matching the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

可选地,所述访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型;Optionally, the data type of the access result data includes: a first type of data type and/or a second type of data type;

其中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与所述第一类数据类型的访问结果数据相对应的伪结果数据;Among them, the protection strategy matching the first type of data includes: pre-setting corresponding fake result data for the access result data of the first type of data, when intercepting the access request sent for the access result data of the first type of data message, returning pseudo-result data corresponding to the access result data of the first type of data type for the access request message;

与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message.

可选地,所述第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型;Optionally, the first type of data type includes: a type corresponding to data that exists in both a virtualized environment and a non-virtualized environment;

所述第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型;The second type of data type includes: a type corresponding to data available in a virtualized environment and not available in a non-virtualized environment;

其中,所述虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。Wherein, the virtualized environment includes: a virtualized environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox.

可选地,所述拦截模块进一步适于:Optionally, the interception module is further adapted to:

预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口,针对所述应用程序接口设置挂钩函数;Predetermining an application program interface corresponding to an access request message for accessing the environment feature information of the virtualized environment, and setting a hook function for the application program interface;

其中,所述挂钩函数用于监测通过所述应用程序接口触发的访问请求消息。Wherein, the hook function is used to monitor the access request message triggered through the API.

可选地,所述拦截模块具体适于:Optionally, the interception module is specifically adapted to:

监测入侵所述虚拟化环境的电子设备针对所述虚拟化环境发出的访问行为,根据所述访问行为确定所述用于访问所述虚拟化环境的环境特征信息的访问请求消息。Monitoring the access behavior sent by the electronic device invading the virtualization environment with respect to the virtualization environment, and determining the access request message for accessing the environment feature information of the virtualization environment according to the access behavior.

可选地,所述环境特征信息包括以下中的至少一个:物理网卡信息、注册表信息、以及驱动信息。Optionally, the environment feature information includes at least one of the following: physical network card information, registry information, and driver information.

其中,该装置可由上述系统中的第一入侵检测模块和/或第二入侵检测模块实现。Wherein, the device can be realized by the first intrusion detection module and/or the second intrusion detection module in the above system.

根据本发明一个实施例提供了一种非易失性计算机存储介质,所述计算机存储介质存储有至少一可执行指令,该计算机可执行指令可执行上述任意方法实施例中的虚拟化环境的防护方法。According to one embodiment of the present invention, a non-volatile computer storage medium is provided, the computer storage medium stores at least one executable instruction, and the computer executable instruction can perform the protection of the virtualized environment in any of the above method embodiments. method.

图5示出了根据本发明一个实施例提供的电子设备的结构示意图,本发明具体实施例并不对电子设备的具体实现做限定。Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the electronic device.

如图5所示,该电子设备可以包括:处理器(processor)502、通信接口(Communications Interface)504、存储器(memory)506、以及通信总线508。As shown in FIG. 5 , the electronic device may include: a processor (processor) 502 , a communication interface (Communications Interface) 504 , a memory (memory) 506 , and a communication bus 508 .

其中:处理器502、通信接口504、以及存储器506通过通信总线508完成相互间的通信。Wherein: the processor 502 , the communication interface 504 , and the memory 506 communicate with each other through the communication bus 508 .

通信接口504,用于与其它设备比如客户端或其它服务器等的网元通信。The communication interface 504 is configured to communicate with network elements of other devices such as clients or other servers.

处理器502,用于执行程序510,具体可以执行上述性能测试方法实施例中的相关步骤。The processor 502 is configured to execute the program 510, specifically, may execute the relevant steps in the above performance testing method embodiments.

具体地,程序510可以包括程序代码,该程序代码包括计算机操作指令。Specifically, the program 510 may include program codes including computer operation instructions.

处理器502可能是中央处理器CPU,或者是特定集成电路ASIC(ApplicationSpecific Integrated Circuit),或者是被配置成实施本发明实施例的一个或多个集成电路。电子设备包括的一个或多个处理器,可以是同一类型的处理器,如一个或多个CPU;也可以是不同类型的处理器,如一个或多个CPU以及一个或多个ASIC。The processor 502 may be a central processing unit CPU, or an ASIC (Application Specific Integrated Circuit), or one or more integrated circuits configured to implement the embodiments of the present invention. The one or more processors included in the electronic device may be of the same type, such as one or more CPUs, or may be different types of processors, such as one or more CPUs and one or more ASICs.

存储器506,用于存放程序510。存储器506可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。The memory 506 is used to store the program 510 . The memory 506 may include a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.

程序510具体可以用于使得处理器502执行以下操作:The program 510 can specifically be used to make the processor 502 perform the following operations:

当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;intercepting the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualization environment;

确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;determining the access result data corresponding to the access request message, and determining the data type of the access result data;

查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。Query the protection policy that matches the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

其中,所述访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型;Wherein, the data type of the access result data includes: the first type of data type and/or the second type of data type;

其中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与所述第一类数据类型的访问结果数据相对应的伪结果数据;Among them, the protection strategy matching the first type of data includes: pre-setting corresponding fake result data for the access result data of the first type of data, when intercepting the access request sent for the access result data of the first type of data message, returning pseudo-result data corresponding to the access result data of the first type of data type for the access request message;

与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message.

其中,所述第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型;Wherein, the first type of data type includes: the type corresponding to the data in both the virtualization environment and the non-virtualization environment;

所述第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型;The second type of data type includes: a type corresponding to data available in a virtualized environment and not available in a non-virtualized environment;

其中,所述虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。Wherein, the virtualized environment includes: a virtualized environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox.

程序510具体可以用于使得处理器502执行以下操作:预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口,针对所述应用程序接口设置挂钩函数;The program 510 may be specifically configured to cause the processor 502 to perform the following operations: predetermine an application program interface corresponding to an access request message for accessing the environment feature information of the virtualized environment, and set a hook function for the application program interface;

其中,所述挂钩函数用于监测通过所述应用程序接口触发的访问请求消息。Wherein, the hook function is used to monitor the access request message triggered through the API.

程序510具体可以用于使得处理器502执行以下操作:监测入侵所述虚拟化环境的电子设备针对所述虚拟化环境发出的访问行为,根据所述访问行为确定所述用于访问所述虚拟化环境的环境特征信息的访问请求消息。The program 510 may be specifically configured to enable the processor 502 to perform the following operations: monitor the access behavior sent by the electronic device invading the virtualization environment for the virtualization environment, and determine the user for accessing the virtualization environment according to the access behavior. An access request message for environment characteristic information of the environment.

其中,所述环境特征信息包括以下中的至少一个:物理网卡信息、注册表信息、以及驱动信息。Wherein, the environment feature information includes at least one of the following: physical network card information, registry information, and driver information.

在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.

在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.

类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline this disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the invention are sometimes grouped together in a single embodiment, figure, or its description. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.

本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any method or method so disclosed may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.

此外,本领域的技术人员能够理解,尽管在此的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. And form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.

本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all functions of some or all components in the device according to the embodiments of the present invention. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a carrier signal, or provided in any other form.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names.

本发明还公开了A1.一种虚拟化环境的防护方法,包括:The present invention also discloses A1. A protection method for a virtualized environment, comprising:

当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;intercepting the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualization environment;

确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;determining the access result data corresponding to the access request message, and determining the data type of the access result data;

查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。Query the protection policy that matches the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

A2.根据A1所述的方法,其中,所述访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型;A2. The method according to A1, wherein the data type of the access result data includes: a first type of data type and/or a second type of data type;

其中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与所述第一类数据类型的访问结果数据相对应的伪结果数据;Among them, the protection strategy matching the first type of data includes: pre-setting corresponding fake result data for the access result data of the first type of data, when intercepting the access request sent for the access result data of the first type of data message, returning pseudo-result data corresponding to the access result data of the first type of data type for the access request message;

与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message.

A3.根据A2所述的方法,其中,所述第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型;A3. The method according to A2, wherein the first type of data type includes: a type corresponding to data that exists in both a virtualized environment and a non-virtualized environment;

所述第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型;The second type of data type includes: a type corresponding to data available in a virtualized environment and not available in a non-virtualized environment;

其中,所述虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。Wherein, the virtualized environment includes: a virtualized environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox.

A4.根据A1-3任一所述的方法,其中,所述方法执行之前,进一步包括步骤:A4. The method according to any one of A1-3, wherein, before the method is executed, further comprising steps:

预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口,针对所述应用程序接口设置挂钩函数;Predetermining an application program interface corresponding to an access request message for accessing the environment feature information of the virtualized environment, and setting a hook function for the application program interface;

其中,所述挂钩函数用于监测通过所述应用程序接口触发的访问请求消息。Wherein, the hook function is used to monitor the access request message triggered through the API.

A5.根据A4所述的方法,其中,所述预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口的步骤具体包括:A5. The method according to A4, wherein the step of predetermining the application program interface corresponding to the access request message for accessing the environment feature information of the virtualized environment specifically includes:

监测入侵所述虚拟化环境的电子设备针对所述虚拟化环境发出的访问行为,根据所述访问行为确定所述用于访问所述虚拟化环境的环境特征信息的访问请求消息。Monitoring the access behavior sent by the electronic device invading the virtualization environment with respect to the virtualization environment, and determining the access request message for accessing the environment feature information of the virtualization environment according to the access behavior.

A6.根据A1-5任一所述的方法,其中,所述环境特征信息包括以下中的至少一个:物理网卡信息、注册表信息、以及驱动信息。A6. The method according to any one of A1-5, wherein the environment feature information includes at least one of the following: physical network card information, registry information, and driver information.

本发明还公开了B7.一种虚拟化环境的防护装置,包括:The present invention also discloses B7. A protective device for a virtualized environment, comprising:

拦截模块,适于当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;An intercepting module, adapted to intercept the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualized environment;

确定模块,适于确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;A determining module, adapted to determine access result data corresponding to the access request message, and determine a data type of the access result data;

防护模块,适于查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。The protection module is adapted to query a protection policy matching the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy.

B8.根据B7所述的装置,其中,所述访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型;B8. The device according to B7, wherein the data type of the access result data includes: a first type of data type and/or a second type of data type;

其中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与所述第一类数据类型的访问结果数据相对应的伪结果数据;Among them, the protection strategy matching the first type of data includes: pre-setting corresponding fake result data for the access result data of the first type of data, when intercepting the access request sent for the access result data of the first type of data message, returning pseudo-result data corresponding to the access result data of the first type of data type for the access request message;

与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message.

B9.根据B8所述的装置,其中,所述第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型;B9. The device according to B8, wherein the first type of data type includes: a type corresponding to data that exists in both a virtualized environment and a non-virtualized environment;

所述第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型;The second type of data type includes: a type corresponding to data available in a virtualized environment and not available in a non-virtualized environment;

其中,所述虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。Wherein, the virtualized environment includes: a virtualized environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox.

B10.根据B7-9任一所述的装置,其中,所述拦截模块进一步适于:B10. The device according to any one of B7-9, wherein the interception module is further adapted to:

预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口,针对所述应用程序接口设置挂钩函数;Predetermining an application program interface corresponding to an access request message for accessing the environment feature information of the virtualized environment, and setting a hook function for the application program interface;

其中,所述挂钩函数用于监测通过所述应用程序接口触发的访问请求消息。Wherein, the hook function is used to monitor the access request message triggered through the API.

B11.根据B10所述的装置,其中,所述拦截模块具体适于:B11. The device according to B10, wherein the interception module is specifically adapted to:

监测入侵所述虚拟化环境的电子设备针对所述虚拟化环境发出的访问行为,根据所述访问行为确定所述用于访问所述虚拟化环境的环境特征信息的访问请求消息。Monitoring the access behavior sent by the electronic device invading the virtualization environment with respect to the virtualization environment, and determining the access request message for accessing the environment feature information of the virtualization environment according to the access behavior.

B12.根据B7-11任一所述的装置,其中,所述环境特征信息包括以下中的至少一个:物理网卡信息、注册表信息、以及驱动信息。B12. The device according to any one of B7-11, wherein the environment characteristic information includes at least one of the following: physical network card information, registry information, and driver information.

Claims (10)

1.一种虚拟化环境的防护方法,包括:1. A protection method for a virtualized environment, comprising: 当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;intercepting the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualization environment; 确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;determining the access result data corresponding to the access request message, and determining the data type of the access result data; 查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。Query the protection policy that matches the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy. 2.根据权利要求1所述的方法,其中,所述访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型;2. The method according to claim 1, wherein the data type of the access result data comprises: a first type of data type and/or a second type of data type; 其中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与所述第一类数据类型的访问结果数据相对应的伪结果数据;Among them, the protection strategy matching the first type of data includes: pre-setting corresponding fake result data for the access result data of the first type of data, when intercepting the access request sent for the access result data of the first type of data message, returning pseudo-result data corresponding to the access result data of the first type of data type for the access request message; 与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message. 3.根据权利要求2所述的方法,其中,所述第一类数据类型包括:在虚拟化环境中以及非虚拟化环境中同时具备的数据所对应的类型;3. The method according to claim 2, wherein the first type of data type includes: a type corresponding to data that exists in both a virtualized environment and a non-virtualized environment; 所述第二类数据类型包括:在虚拟化环境中具备、且在非虚拟化环境中不具备的数据所对应的类型;The second type of data type includes: a type corresponding to data available in a virtualized environment and not available in a non-virtualized environment; 其中,所述虚拟化环境包括:由虚拟机构造的虚拟化环境、和/或由沙箱构造的虚拟化环境。Wherein, the virtualized environment includes: a virtualized environment constructed by a virtual machine, and/or a virtualized environment constructed by a sandbox. 4.根据权利要求1-3任一所述的方法,其中,所述方法执行之前,进一步包括步骤:4. The method according to any one of claims 1-3, wherein, before the method is executed, further comprising the steps of: 预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口,针对所述应用程序接口设置挂钩函数;Predetermining an application program interface corresponding to an access request message for accessing the environment feature information of the virtualized environment, and setting a hook function for the application program interface; 其中,所述挂钩函数用于监测通过所述应用程序接口触发的访问请求消息。Wherein, the hook function is used to monitor the access request message triggered through the API. 5.根据权利要求4所述的方法,其中,所述预先确定用于访问所述虚拟化环境的环境特征信息的访问请求消息所对应的应用程序接口的步骤具体包括:5. The method according to claim 4, wherein the step of predetermining the application program interface corresponding to the access request message for accessing the environment characteristic information of the virtualized environment specifically comprises: 监测入侵所述虚拟化环境的电子设备针对所述虚拟化环境发出的访问行为,根据所述访问行为确定所述用于访问所述虚拟化环境的环境特征信息的访问请求消息。Monitoring the access behavior sent by the electronic device invading the virtualization environment with respect to the virtualization environment, and determining the access request message for accessing the environment feature information of the virtualization environment according to the access behavior. 6.根据权利要求1-5任一所述的方法,其中,所述环境特征信息包括以下中的至少一个:物理网卡信息、注册表信息、以及驱动信息。6. The method according to any one of claims 1-5, wherein the environment feature information includes at least one of the following: physical network card information, registry information, and driver information. 7.一种虚拟化环境的防护装置,包括:7. A protective device for a virtualized environment, comprising: 拦截模块,适于当监测到用于访问所述虚拟化环境的环境特征信息的访问请求消息时,拦截所述访问请求消息;An intercepting module, adapted to intercept the access request message when monitoring the access request message for accessing the environment characteristic information of the virtualized environment; 确定模块,适于确定与所述访问请求消息相对应的访问结果数据,并确定所述访问结果数据的数据类型;A determining module, adapted to determine access result data corresponding to the access request message, and determine a data type of the access result data; 防护模块,适于查询与所述访问结果数据的数据类型相匹配的防护策略,根据查询到的防护策略对所述访问请求消息进行防护处理。The protection module is adapted to query a protection policy matching the data type of the access result data, and perform protection processing on the access request message according to the queried protection policy. 8.根据权利要求7所述的装置,其中,所述访问结果数据的数据类型包括:第一类数据类型和/或第二类数据类型;8. The device according to claim 7, wherein the data type of the access result data comprises: a first type of data type and/or a second type of data type; 其中,与第一类数据类型相匹配的防护策略包括:预先针对第一类数据类型的访问结果数据设置对应的伪结果数据,当拦截到针对第一类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回与所述第一类数据类型的访问结果数据相对应的伪结果数据;Among them, the protection strategy matching the first type of data includes: pre-setting corresponding fake result data for the access result data of the first type of data, when intercepting the access request sent for the access result data of the first type of data message, returning pseudo-result data corresponding to the access result data of the first type of data type for the access request message; 与第二类数据类型相匹配的防护策略包括:当拦截到针对第二类数据类型的访问结果数据发出的访问请求消息时,针对该访问请求消息返回空消息。The protection strategy matching the second type of data includes: when an access request message sent for the access result data of the second type of data is intercepted, return an empty message for the access request message. 9.一种电子设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;9. An electronic device, comprising: a processor, a memory, a communication interface, and a communication bus, wherein the processor, the memory, and the communication interface complete mutual communication through the communication bus; 所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如权利要求1-6中任一项所述的虚拟化环境的防护方法对应的操作。The memory is used to store at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the method for protecting a virtualized environment according to any one of claims 1-6. 10.一种计算机存储介质,所述存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行如权利要求1-6中任一项所述的虚拟化环境的防护方法对应的操作。10. A computer storage medium, wherein at least one executable instruction is stored in the storage medium, and the executable instruction causes a processor to execute the corresponding protection method for a virtualized environment according to any one of claims 1-6. operation.
CN201710940390.4A 2017-09-30 2017-09-30 Protection method and device for virtualized environment Active CN107566401B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710940390.4A CN107566401B (en) 2017-09-30 2017-09-30 Protection method and device for virtualized environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710940390.4A CN107566401B (en) 2017-09-30 2017-09-30 Protection method and device for virtualized environment

Publications (2)

Publication Number Publication Date
CN107566401A true CN107566401A (en) 2018-01-09
CN107566401B CN107566401B (en) 2021-01-08

Family

ID=60984449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710940390.4A Active CN107566401B (en) 2017-09-30 2017-09-30 Protection method and device for virtualized environment

Country Status (1)

Country Link
CN (1) CN107566401B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110198300A (en) * 2019-03-13 2019-09-03 腾讯科技(深圳)有限公司 A kind of honey jar operation system fingerprint concealment method and device
CN110351237A (en) * 2019-05-23 2019-10-18 中国科学院信息工程研究所 Honey jar method and device for numerically-controlled machine tool
CN110427785A (en) * 2019-07-23 2019-11-08 腾讯科技(深圳)有限公司 Acquisition methods and device, the storage medium and electronic device of device-fingerprint
CN111490996A (en) * 2020-06-24 2020-08-04 腾讯科技(深圳)有限公司 Network attack processing method and device, computer equipment and storage medium
CN114465748A (en) * 2021-09-28 2022-05-10 北京卫达信息技术有限公司 Attack trapping method and system based on multi-bait dynamic cooperation
CN115941345A (en) * 2022-12-20 2023-04-07 安天科技集团股份有限公司 Method, device, server, electronic equipment and storage medium for network attacker information acquisition
WO2024234861A1 (en) * 2023-05-16 2024-11-21 华为技术有限公司 Threat event sourcing method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic
CN105978911A (en) * 2016-07-15 2016-09-28 江苏博智软件科技有限公司 Malicious code detection method and device based on virtual execution technology
CN106650423A (en) * 2016-11-28 2017-05-10 北京奇虎科技有限公司 Object sample file detecting method and device
CN106778257A (en) * 2016-12-08 2017-05-31 北京国电通网络技术有限公司 A kind of anti-release apparatus of virtual machine

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic
CN105978911A (en) * 2016-07-15 2016-09-28 江苏博智软件科技有限公司 Malicious code detection method and device based on virtual execution technology
CN106650423A (en) * 2016-11-28 2017-05-10 北京奇虎科技有限公司 Object sample file detecting method and device
CN106778257A (en) * 2016-12-08 2017-05-31 北京国电通网络技术有限公司 A kind of anti-release apparatus of virtual machine

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110198300A (en) * 2019-03-13 2019-09-03 腾讯科技(深圳)有限公司 A kind of honey jar operation system fingerprint concealment method and device
CN110198300B (en) * 2019-03-13 2022-01-14 腾讯科技(深圳)有限公司 Honeypot operating system fingerprint hiding method and device
CN110351237A (en) * 2019-05-23 2019-10-18 中国科学院信息工程研究所 Honey jar method and device for numerically-controlled machine tool
CN110351237B (en) * 2019-05-23 2020-07-10 中国科学院信息工程研究所 Honeypot method and device for numerical control machine tool
CN110427785A (en) * 2019-07-23 2019-11-08 腾讯科技(深圳)有限公司 Acquisition methods and device, the storage medium and electronic device of device-fingerprint
CN110427785B (en) * 2019-07-23 2023-07-14 腾讯科技(深圳)有限公司 Equipment fingerprint acquisition method and device, storage medium and electronic device
CN111490996A (en) * 2020-06-24 2020-08-04 腾讯科技(深圳)有限公司 Network attack processing method and device, computer equipment and storage medium
CN111490996B (en) * 2020-06-24 2020-10-23 腾讯科技(深圳)有限公司 Network attack processing method and device, computer equipment and storage medium
CN114465748A (en) * 2021-09-28 2022-05-10 北京卫达信息技术有限公司 Attack trapping method and system based on multi-bait dynamic cooperation
CN115941345A (en) * 2022-12-20 2023-04-07 安天科技集团股份有限公司 Method, device, server, electronic equipment and storage medium for network attacker information acquisition
WO2024234861A1 (en) * 2023-05-16 2024-11-21 华为技术有限公司 Threat event sourcing method and related device

Also Published As

Publication number Publication date
CN107566401B (en) 2021-01-08

Similar Documents

Publication Publication Date Title
US12455957B2 (en) Methods and apparatus for control and detection of malicious content using a sandbox environment
US10872151B1 (en) System and method for triggering analysis of an object for malware in response to modification of that object
US11562068B2 (en) Performing threat detection by synergistically combining results of static file analysis and behavior analysis
CN107612924B (en) Attacker positioning method and device based on wireless network intrusion
US10523609B1 (en) Multi-vector malware detection and analysis
CN107579997A (en) Wireless Network Intrusion Detection System
US10454950B1 (en) Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10587647B1 (en) Technique for malware detection capability comparison of network security devices
CN107465702B (en) Method and device for early warning based on wireless network intrusion
JP6441957B2 (en) Systems, devices, and methods that automatically validate exploits on suspicious objects and highlight display information associated with the proven exploits
US10148693B2 (en) Exploit detection system
US10339300B2 (en) Advanced persistent threat and targeted malware defense
US11636208B2 (en) Generating models for performing inline malware detection
JP6624771B2 (en) Client-based local malware detection method
CN104766011B (en) The sandbox detection alarm method and system of Intrusion Detection based on host feature
US20210200859A1 (en) Malware detection by a sandbox service by utilizing contextual information
CN107566401A (en) The means of defence and device of virtualized environment
US20170353434A1 (en) Methods for detection of reflected cross site scripting attacks
US20120272317A1 (en) System and method for detecting infectious web content
US11909761B2 (en) Mitigating malware impact by utilizing sandbox insights
CN103685294B (en) Method and device for identifying attack sources of denial of service attack
CN110647744A (en) Identifying and extracting key hazard forensic indicators using object-specific file system views
CN103701816B (en) Perform the scan method and scanning means of the server of Denial of Service attack
US12430437B2 (en) Specific file detection baked into machine learning pipelines
CN107509200A (en) Equipment localization method and device based on wireless network invasion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant